This book constitutes the refereed proceedings of the 1998 International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT '98, held in Espoo, Finland, in May/June 1998.
The book presents 44 revised full papers selected from a total of 161 submissions. The papers are organized in sections on distributed cryptography, complexity, cryptanalysis of block ciphers, computational algorithms, paradigms for symmetric systems, public key cryptosystems, multi-party computation, digital signatures, Boolean functions, combinatorial design and analysis, elliptic curve systems, and electronic commerce and payment.
Author(s): Victor Shoup, Rosario Gennaro (auth.), Kaisa Nyberg (eds.)
Series: Lecture Notes in Computer Science 1403
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1998
Language: English
Pages: 613
Tags: Data Encryption; Computer Communication Networks; Discrete Mathematics in Computer Science; Computers and Society; Computational Mathematics and Numerical Analysis
Securing threshold cryptosystems against chosen ciphertext attack....Pages 1-16
Auto-recoverable auto-certifiable cryptosystems....Pages 17-31
A practical and provably secure scheme for publicly verifiable secret sharing and its applications....Pages 32-46
Equivalence of counting the number of points on elliptic curve over the ring Zn and factoring n ....Pages 47-58
Breaking RSA may not be equivalent to factoring....Pages 59-71
Lower bounds on generic algorithms in groups....Pages 72-84
Improved cryptanalysis of RC5....Pages 85-99
Cryptanalysis of the ANSI X9.52 CBCM mode....Pages 100-111
Differential-linear weak key classes of IDEA....Pages 112-126
Divertible protocols and atomic proxy cryptography....Pages 127-144
Optimum traitor tracing and asymmetric schemes....Pages 145-157
On finding small solutions of modular multivariate polynomial equations....Pages 158-170
Computing discrete logarithms with quadratic number rings....Pages 171-183
Improved algorithms for isomorphisms of polynomials....Pages 184-200
Visual cryptanalysis....Pages 201-210
How to improve an exponentiation black-box....Pages 211-220
Speeding up discrete log and factoring based schemes via precomputations....Pages 221-235
Fast batch verification for modular exponentiation and digital signatures....Pages 236-250
A formal treatment of remotely keyed encryption....Pages 251-265
Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible....Pages 266-280
The chain & sum primitive and its applications to MACs and stream ciphers....Pages 281-293
A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption....Pages 294-307
A new public-key cryptosystem as secure as factoring....Pages 308-318
Towards a better understanding of one-wayness: Facing linear permutations....Pages 319-333
Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?....Pages 334-345
Secure communication in minimal connectivity models....Pages 346-360
On the foundations of oblivious transfer....Pages 361-374
Quorum-based secure multi-party computation....Pages 375-390
Strengthened security for blind signatures....Pages 391-405
Generic constructions for secure and efficient confirmer signature schemes....Pages 406-421
Security analysis of a practical “on the fly” authentication and signature generation....Pages 422-436
Universally verifiable mix-net with verification work independent of the number of mix-servers....Pages 437-447
A practical mix....Pages 448-461
On the propagation criterion of degree l and order k ....Pages 462-474
Highly nonlinear balanced Boolean functions with a good correlation-immunity....Pages 475-488
Heuristic design of cryptographically strong balanced Boolean functions....Pages 489-499
Secret sharing schemes with bipartite access structure....Pages 500-511
Combinatorial bounds for broadcast encryption....Pages 512-526
New results on multi-receiver authentication codes....Pages 527-541
Specialized integer factorization....Pages 542-545
Security of an identity-based cryptosystem and the related reductions....Pages 546-560
Easy come — Easy go divisible cash....Pages 561-575
Secure and efficient metering....Pages 576-590
Optimistic fair exchange of digital signatures....Pages 591-606