Public Key Cryptography – PKC 2007: 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2007, held in Beijing, China in April 2007.

The 29 revised full papers presented together with two invited lectures were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on signatures, cryptanalysis, protocols, multivariate cryptosystems, encryption, number theoretic techniques, and public-key infrastructure.

Author(s): Xavier Boyen, Brent Waters (auth.), Tatsuaki Okamoto, Xiaoyun Wang (eds.)
Series: Lecture Notes in Computer Science 4450 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007

Language: English
Pages: 498
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Computers and Society; Management of Computing and Information Systems

Front Matter....Pages -
Full-Domain Subgroup Hiding and Constant-Size Group Signatures....Pages 1-15
A Direct Anonymous Attestation Scheme for Embedded Devices....Pages 16-30
Anonymous Signatures Made Easy....Pages 31-42
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures....Pages 43-60
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions....Pages 61-75
Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol....Pages 76-88
New Chosen-Ciphertext Attacks on NTRU....Pages 89-106
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003....Pages 107-117
Optimistic Fair Exchange in a Multi-user Setting....Pages 118-133
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures....Pages 134-149
Knowledge-Binding Commitments with Applications in Time-Stamping....Pages 150-165
Efficient Ring Signatures Without Random Oracles....Pages 166-180
Traceable Ring Signature....Pages 181-200
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles....Pages 201-216
Improved On-Line/Off-Line Threshold Signatures....Pages 217-232
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems....Pages 233-248
Cryptanalysis of HFE with Internal Perturbation....Pages 249-265
ℓ-Invertible Cycles for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic ( ${\mathcal{MQ}}$ ) Public Key Cryptography....Pages 266-281
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman....Pages 282-297
Parallel Key-Insulated Public Key Encryption Without Random Oracles....Pages 298-314
Multi-bit Cryptosystems Based on Lattice Problems....Pages 315-329
Practical and Secure Solutions for Integer Comparison....Pages 330-342
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol....Pages 343-360
Identity-Based Traitor Tracing....Pages 361-376
Verifiable Shuffle of Large Size Ciphertexts....Pages 377-392
A Survey of Single-Database Private Information Retrieval: Techniques and Applications....Pages 393-411
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi’s RSA....Pages 412-425
Efficient Pseudorandom Generators Based on the DDH Assumption....Pages 426-441
Fast Batch Verification of Multiple Signatures....Pages 442-457
A Closer Look at PKI: Security and Efficiency....Pages 458-475
Self-Generated-Certificate Public Key Encryption Without Pairing....Pages 476-489
Back Matter....Pages -