Limit search to available items
Book Cover
E-book
Author International Workshop on Practice and Theory in Public Key Cryptography (13th : 2010 : Paris, France)

Title Public key cryptography--PKC 2010 : 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings / Phong Q. Nguyen, David Pointcheval (eds.)
Published Berlin ; New York : Springer, ©2010

Copies

Description 1 online resource (xiii, 517 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 6056
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 6056. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Encryption I. Simple and efficient public-key encryption from computational Diffie-Hellman in the standard model / Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, and Victor Shoup -- Constant size ciphertexts in threshold attribute-based encryption / Javier Herranz, Fabien Laguillaumie, and Carla Ràfols -- Cryptanalysis. Algebraic cryptanalysis of the PKC'2009 algebraic surface cryptosystem / Jean-Charles Faugère and Pierre-Jean Spaenlehauer -- Maximizing small root bounds by linearization and applications to small secret exponent RSA / Mathias Herrmann and Alexander May -- Implicit factoring with shared most significant and middle bits / Jean-Charles Faugère, Raphaël Marinier, and Guénaël Renault -- Protocols I. On the feasibility of consistent computations / Sven Laur and Helger Lipmaa -- Multi-query computationally-private information retrieval with constant communication rate / Jens Groth, Aggelos Kiayias, and Helger Lipmaa -- Further observations on optimistic fair exchange protocols in the multi-user setting / Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, and Yang Xiang -- Network coding. Secure network coding over the integers / Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, and Tal Rabin -- Preventing pollution attacks in multi-source network coding / Shweta Agrawal, Dan Boneh, Xavier Boyen, and David Mandell Freeman -- Groth-Sahai proofs revisited / Essam Ghadafi, Nigel P. Smart, and Bogdan Warinschi -- Constant-round concurrent non-malleable statistically binding commitments and decommitments / Zhenfu Cao, Ivan Visconti, and Zongyang Zhang -- Elliptic curves. Faster squaring in the cyclotomic subgroup of sixth degree extensions / Robert Granger and Michael Scott -- Faster pairing computations on curves with high-degree twists / Craig Costello, Tanja Lange, and Michael Naehrig -- Efficient arithmetic on Hessian curves / Reza R. Farashahi and Marc Joye -- Lossy trapdoor functions. CCA proxy re-encryption without bilinear maps in the standard model / Toshihide Matsuda, Ryo Nishimaki, and Keisuke Tanaka -- More constructions of lossy and correlation-secure trapdoor functions / David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, and Gil Segev -- Chosen-ciphertext security from slightly lossy trapdoor functions / Petros Mol and Scott Yilek -- Protocols II. Efficient set operations in the presence of malicious adversaries / Carmit Hazay and Kobbi Nissim -- Text search protocols with simulation based security / Rosario Gennaro, Carmit Hazay, and Jeffrey S. Sorensen -- Discrete logarithm. Solving a 676-bit discrete logarithm problem in GF(3⁶n) / Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, and Tsuyoshi Takagi -- Using equivalence classes to accelerate solving the discrete logarithm problem in a short interval / Steven D. Galbraith and Raminder S. Ruprai -- Encryption II. Functional encryption for inner product : achieving constant-size ciphertexts with adaptive security or support for negation / Nuttapong Attrapadung and Benoît Libert -- Security of encryption schemes in weakened random oracle models (extended abstract) / Akinori Kawachi, Akira Numayama, Keisuke Tanaka, and Keita Xagawa -- Fully homomorphic encryption with relatively small key and ciphertext sizes / Nigel P. Smart and Frederik Vercauteren -- Signatures. Unlinkability of sanitizable signatures / Christina Brzuska, Marc Fischlin, Anja Lehmann, and Dominique Schröder -- Confidential signatures and deterministic signcryption / Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, and Dominique Schröder -- Identity-based aggregate and multi-signature schemes based on RSA / Ali Bagherzandi and Stanislaw Jarecki -- Lattice mixing and vanishing trapdoors : a framework for fully secure short signatures and more / Xavier Boyen
Summary Annotation This book constitutes the refereed proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography, PKC 2010, held in Paris, France, in May 2010. The 29 revised full papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on encryption; cryptanalysis; protocols; network coding; tools; elliptic curves; lossy trapdoor functions; discrete logarithm; and signatures
Notes Copyright International Association for Cryptologic Research
Bibliography Includes bibliographical references and index
Notes Print version record
Subject Computer security -- Congresses
Computers -- Access control -- Congresses
Data encryption (Computer science) -- Congresses
Public key cryptography -- Congresses
Computer security.
Computer Security
Computers -- Access control.
Data encryption (Computer science)
Public key cryptography.
Computer security.
Informatique.
Computer security
Computers -- Access control
Data encryption (Computer science)
Public key cryptography
Public-Key-Kryptosystem
Paris <2010>
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Nguyen, Phong Q. (Phong Quang)
Pointcheval, David.
International Association for Cryptologic Research.
ISBN 9783642130137
3642130135
Other Titles PKC 2010