This book constitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2005, held in Les Diablerets, Switzerland in January 2005.
The 28 revised full papers presented were carefully reviewed and selected from 126 submissions. The papers are organized in topical sections on cryptanalysis, key establishment, optimization, building blocks, RSA cryptography, multivariate asymmetric cryptography, signature schemes, and identity-based cryptography.
Author(s): Oded Yacobi, Yacov Yacobi (auth.), Serge Vaudenay (eds.)
Series: Lecture Notes in Computer Science 3386 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005
Language: English
Pages: 436
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Computers and Society; Management of Computing and Information Systems
Front Matter....Pages -
A New Related Message Attack on RSA....Pages 1-8
Breaking a Cryptographic Protocol with Pseudoprimes....Pages 9-15
Experimenting with Faults, Lattices and the DSA....Pages 16-28
Securing RSA-KEM via the AES....Pages 29-46
One-Time Verifier-Based Encrypted Key Exchange....Pages 47-64
Password-Based Authenticated Key Exchange in the Three-Party Setting....Pages 65-84
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods....Pages 85-103
Symmetric Subgroup Membership Problems....Pages 104-119
Optimizing Robustness While Generating Shared Secret Safe Primes....Pages 120-137
Fast Multi-computations with Integer Similarity Strategy....Pages 138-153
Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order....Pages 154-171
Efficient k -Out-of- n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries....Pages 172-183
Converse Results to the Wiener Attack on RSA....Pages 184-198
RSA with Balanced Short Exponents and Its Application to Entity Authentication....Pages 199-215
The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity....Pages 216-233
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited....Pages 234-243
Tractable Rational Map Signature....Pages 244-257
Cryptanalysis of the Tractable Rational Map Cryptosystem....Pages 258-274
Large Superfluous Keys in $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic Asymmetric Systems....Pages 275-287
Cryptanalysis of HFEv and Internal Perturbation of HFE....Pages 288-301
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible....Pages 302-312
Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring....Pages 313-327
The Security of the FDH Variant of Chaum’s Undeniable Signature Scheme....Pages 328-345
Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions....Pages 346-361
Improved Identity-Based Signcryption....Pages 362-379
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption....Pages 380-397
CBE from CL-PKE: A Generic Construction and Efficient Schemes....Pages 398-415
A Verifiable Random Function with Short Proofs and Keys....Pages 416-431
Back Matter....Pages -