This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, held in Taormina, Italy, in March 2011.
The 28 papers presented were carefully reviewed and selected from 103 submissions. The book also contains one invited talk. The papers are grouped in topical sections on signatures, attribute based encryption, number theory, protocols, chosen-ciphertext security, encryption, zero-knowledge, and cryptanalysis.
Author(s): Dan Boneh, David Mandell Freeman (auth.), Dario Catalano, Nelly Fazio, Rosario Gennaro, Antonio Nicolosi (eds.)
Series: Lecture Notes in Computer Science 6571
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2011
Language: English
Pages: 495
Tags: Computer Communication Networks; Data Encryption; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Systems and Data Security; Discrete Mathematics in Computer Science
Front Matter....Pages -
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures....Pages 1-16
Homomorphic Network Coding Signatures in the Standard Model....Pages 17-34
Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model....Pages 35-52
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization....Pages 53-70
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption....Pages 71-89
Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts....Pages 90-108
Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three....Pages 109-127
On the Correct Use of the Negation Map in the Pollard rho Method....Pages 128-146
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005....Pages 147-155
(If) Size Matters: Size-Hiding Private Set Intersection....Pages 156-173
Sub-linear, Secure Comparison with Two Non-colluding Parties....Pages 174-191
Oblivious Transfer with Hidden Access Control Policies....Pages 192-209
Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited....Pages 210-227
Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security....Pages 228-245
Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks....Pages 246-264
Secure Blind Decryption....Pages 265-282
New Developments in Leakage-Resilient Cryptography....Pages 283-283
On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010....Pages 284-295
Fully Secure Accountable-Authority Identity-Based Encryption....Pages 296-316
One-Pass HMQV and Asymmetric Key-Wrapping....Pages 317-334
Linear Recurring Sequences for the UOV Key Generation....Pages 335-350
On the Impossibility of Instantiating PSS in the Standard Model....Pages 351-368
On-line Non-transferable Signatures Revisited....Pages 369-386
Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra....Pages 387-402
Signatures on Randomizable Ciphertexts....Pages 403-422
Revocation for Delegatable Anonymous Credentials....Pages 423-440
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants....Pages 441-458
Cryptanalysis of Cryptosystems Based on Non-commutative Skew Polynomials....Pages 459-472
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem....Pages 473-493
Back Matter....Pages -