The Nile on eBay
 

Public Key Cryptography - PKC 2007

by Tatsuaki Okamoto, Xiaoyun Wang

Constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2007, held in Beijing, China in April 2007. This book presents papers that are organized in topical sections on signatures, cryptanalysis, protocols, multivariate cryptosystems, encryption, and public-key infrastructure.

FORMAT
Paperback
LANGUAGE
English
CONDITION
Brand New


Publisher Description

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2007, held in Beijing, China in April 2007. The 29 revised full papers presented together with two invited lectures are organized in topical sections on signatures, cryptanalysis, protocols, multivariate cryptosystems, encryption, number theoretic techniques, and public-key infrastructure.

Table of Contents

Signatures I.- Full-Domain Subgroup Hiding and Constant-Size Group Signatures.- A Direct Anonymous Attestation Scheme for Embedded Devices.- Anonymous Signatures Made Easy.- On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.- Invited Talk I.- Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions.- Cryptanalysis.- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol.- New Chosen-Ciphertext Attacks on NTRU.- Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003.- Protocols I.- Optimistic Fair Exchange in a Multi-user Setting.- Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures.- Knowledge-Binding Commitments with Applications in Time-Stamping.- Signatures II.- Efficient Ring Signatures Without Random Oracles.- Traceable Ring Signature.- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles.- Improved On-Line/Off-Line Threshold Signatures.- Multivariate Cryptosystems.- High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems.- Cryptanalysis of HFE with Internal Perturbation.- ?-Invertible Cycles for ultivariate uadratic ( ) Public Key Cryptography.- Encryption.- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman.- Parallel Key-Insulated Public Key Encryption Without Random Oracles.- Multi-bit Cryptosystems Based on Lattice Problems.- Protocols II.- Practical and Secure Solutions for Integer Comparison.- Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol.- Identity-Based Traitor Tracing.- Verifiable Shuffle of Large Size Ciphertexts.- Invited Talk II.- A Survey of Single-DatabasePrivate Information Retrieval: Techniques and Applications.- Number Theoretic Techniques.- Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA.- Efficient Pseudorandom Generators Based on the DDH Assumption.- Fast Batch Verification of Multiple Signatures.- Public-Key Infrastructure.- A Closer Look at PKI: Security and Efficiency.- Self-Generated-Certificate Public Key Encryption Without Pairing.

Long Description

The 10th International Conference on Theory and Practice of Public-Key Cr- tography (PKC 2007) was held at Tsinghua University in Beijing, China, April 16-20,2007. PKCisthepremierinternationalconferencededicatedtocryptology focusingonallaspectsofpublic-keycryptography. Theeventissponsoredbythe International Association of Cryptologic Research (IACR), and this year it was also sponsored by the National Natural Science Foundation of China (NSFC) and Tsinghua University. The conference received 118 submissions, and the Program Committee - lected 29 of these for presentation. The Program Committee worked very hard toevaluatethepaperswithrespecttoquality,originality,andrelevancetopubl- key cryptography. Each paper was anonymously reviewed by at least three P- gram Committee members. Extended abstracts of the revised versions of the accepted papers are in these proceedings. The program also included three invited lectures by Rafail Ostrovsky with UCLA, USA, Shige Peng with Shandong University, China and AdiShamirwiththeWeizmannInstituteofScience,Israel. Twopapersregarding the invited lectures are included in these proceedings. The PKC 2007 Program Committee had the pleasure of awarding this year's PKC best paper award to XavierBoyenandBrentWatersfortheirpaper,entitled"Full-DomainSubgroup Hiding and Constant-Size Group Signatures. " We are extremely grateful to the Program Committee members for their enormous investment of time and e'ort in the di'cult and delicate process of review and selection. We gratefully acknowledge the help of a large number of external reviewers who reviewed submissions in their area of expertise. We also thank the PKC Steering Committee for their support. ElectronicsubmissionsweremadepossiblebytheWebReviewsystem,iChair, developed by Thomas Baign

Details

ISBN3540716769
Short Title PUBLIC KEY CRYPTOGRAPHY - PKC
Language English
ISBN-10 3540716769
ISBN-13 9783540716761
Media Book
Format Paperback
Series Number 4450
Imprint Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Place of Publication Berlin
Country of Publication Germany
Author Xiaoyun Wang
DEWEY 005.82
Pages 498
Subtitle 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings
Edition 2007th
Edited by Xiaoyun Wang
Illustrations XIV, 498 p.
DOI 10.1604/9783540716761;10.1007/978-3-540-71677-8
Publisher Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition Description 2007 ed.
Year 2007
Publication Date 2007-03-30
Audience Professional & Vocational
Country of Origin US
Product Class Description Computing: Professional & Programming
Series Lecture Notes in Computer Science
Alternative 9783540716778

TheNile_Item_ID:96249910;