default search action
12. PKC 2009: Irvine, CA, USA
- Stanislaw Jarecki, Gene Tsudik:
Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings. Lecture Notes in Computer Science 5443, Springer 2009, ISBN 978-3-642-00467-4
Number Theory
- Alexander May, Maike Ritzenhofen:
Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint. 1-14 - Paz Morillo, Carla Ràfols:
The Security of All Bits Using List Decoding. 15-33 - Yoshinori Aono:
A New Lattice Construction for Partial Key Exposure Attack for RSA. 34-53 - Minkyu Kim, Jung Hee Cheon, Jin Hong:
Subset-Restricted Random Walks for Pollard rho Method on Fpm. 54-67
Applications and Protocols
- Dan Boneh, David Mandell Freeman, Jonathan Katz, Brent Waters:
Signing a Linear Subspace: Signature Schemes for Network Coding. 68-87 - Pascal Junod, Alexandre Karlov, Arjen K. Lenstra:
Improving the Boneh-Franklin Traitor Tracing Scheme. 88-104 - M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. 105-123 - Aggelos Kiayias, Hong-Sheng Zhou:
Zero-Knowledge Proofs with Witness Elimination. 124-138
Multi-Party Protocols
- Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval:
Distributed Public-Key Cryptography from Weak Secrets. 139-159 - Ivan Damgård, Martin Geisler, Mikkel Krøigaard, Jesper Buus Nielsen:
Asynchronous Multiparty Computation: Theory and Implementation. 160-179 - Hossein Ghodosi, Josef Pieprzyk:
Multi-Party Computation with Omnipresent Adversary. 180-195
Identity-Based Encryption
- Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy:
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. 196-214 - Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, Koutarou Suzuki:
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. 215-234 - Benoît Libert, Damien Vergnaud:
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. 235-255 - Sherman S. M. Chow:
Removing Escrow from Identity-Based Encryption. 256-276
Signatures
- Ivan Damgård, Gert Læssøe Mikkelsen:
On the Theory and Practice of Personal Digital Signatures. 277-296 - Marc Fischlin, Dominique Schröder:
Security of Blind Signatures under Aborts. 297-316 - Christina Brzuska, Marc Fischlin, Tobias Freudenreich, Anja Lehmann, Marcus Page, Jakob Schelbert, Dominique Schröder, Florian Volk:
Security of Sanitizable Signatures Revisited. 317-336 - Brian J. Matt:
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures. 337-356
Encryption
- Jun Shao, Zhenfu Cao:
CCA-Secure Proxy Re-encryption without Pairings. 357-376 - Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto:
Compact CCA-Secure Encryption for Messages of Arbitrary Length. 377-392 - Sebastiaan de Hoogh, Berry Schoenmakers, Boris Skoric, José Villegas:
Verifiable Rotation of Homomorphic Encryptions. 393-410
New Cryptosystems and Optimizations
- Mathias Herrmann, Gregor Leander:
A Practical Key Recovery Attack on Basic TCHo. 411-424 - Koichiro Akiyama, Yasuhiro Goto, Hideyuki Miyake:
An Algebraic Surface Cryptosystem. 425-442 - Patrick Longa, Catherine H. Gebotys:
Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication. 443-462
Group Signatures and Anonymous Credentials
- Toru Nakanishi, Hiroki Fujii, Yuta Hira, Nobuo Funabiki:
Revocable Group Signature Schemes with Constant Costs for Signing and Verifying. 463-480 - Jan Camenisch, Markulf Kohlweiss, Claudio Soriente:
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. 481-500 - Scott E. Coull, Matthew Green, Susan Hohenberger:
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials. 501-520
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.