Public Key Cryptography -- PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Proceedings

Overview

This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, held in Taormina, Italy, in March 2011.
The 28 papers presented were carefully reviewed and selected from 103 submissions. The book also contains one invited talk. The papers are grouped in topical sections on signatures, attribute based encryption, number theory, prools, chosen-ciphertext ...

See more details below
Paperback (2011)
$129.00
BN.com price
Other sellers (Paperback)
  • All (7) from $80.98   
  • New (4) from $80.98   
  • Used (3) from $95.06   
Sending request ...

Overview

This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, held in Taormina, Italy, in March 2011.
The 28 papers presented were carefully reviewed and selected from 103 submissions. The book also contains one invited talk. The papers are grouped in topical sections on signatures, attribute based encryption, number theory, prools, chosen-ciphertext security, encryption, zero-knowledge, and cryptanalysis.

Read More Show Less

Product Details

Table of Contents

Signatures I

Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures Dan Boneh David Mandell Freeman 1

Homomorphic Network Coding Signatures in the Standard Model Nuttapong Attrapadung Benoît Libert 17

Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model Tatsuaki Okamoto Katsuyuki Takashima 35

Attribute Based Encryption

Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization Brent Waters 53

Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption Shota Yamada Nuttapong Attrapadung Goichiro Hanaoka Noboru Kunihiro 71

Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts Nuttapong Attrapadung Benoît Libert Elie de Panafieu 90

Number Theory

Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three Roberto Avanzi Clemens Heuberger 109

On the Correct Use of the Negation Map in the Pollard rho Method Daniel J. Bernstein Tanja Lange Peter Schwabe 128

Cryptanalysis of the RSA Subgroup Assumption from TCC 2005 Jean-Sébastien Coron Antoine Joux Avradip Mandal David Naccache Mehdi Tibouchi 147

Protocols

(If) Size Matters: Size-Hiding Private Set Intersection Giuseppe Ateniese Emiliano De Cristofaro Gene Tsudik 156

Sub-linear, Secure Comparison with Two Non-colluding Parties Tomas Toft 174

Oblivious Transfer with Hidden Access Control Policies Jan Camenisch Maria Dubovitskaya Gregory Neven Gregory M. Zaverucha 192

Chosen-Ciphertext Security

Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited Qixiang Mei Bao Li Xianhui Lu Dingding Jia 210

Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security Junzuo Lai Robert H. Deng Shengli Liu 228

Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks Takahiro Matsuda Kanta Matsuura 246

Secure Blind Decryption Matthew Green 265

Invited Talk

New Developments in Leakage-Resilient Cryptography (Abstract) Vinod Vaikuntanathan 283

Encryption

On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010 Jian Weng Yunlei Zhao Goichiro Hanaoka 284

Fully Secure Accountable-Authority Identity-Based Encryption Amit Sahai Hakan Seyalioglu 296

One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk 317

Signatures II

Linear Recurring Sequences for the UOV Key Generation Albrecht Petzoldt Stanislav Bulygin Johannes Buchmann 335

On the Impossibility of Instantiating PSS in the Standard Model Rishiraj Bhattacharyya Avradip Mandal 351

On-line Non-transferable Signatures Revisited Jacob C.N. Schuldt Kanta Matsuura 369

Zero-Knowledge

Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra Jae Hong Seo 387

Signatures on Randomizable Ciphertexts Olivier Blazy Georg Fuchsbauer David Pointcheval Damien Vergnaud 403

Revocation for Delegatable Anonymous Credentials Tolga Acar Lan Nguyen 423

Cryptanalysis

Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants Luk Bettale Jean-Charles Faugère Ludovic Perret 441

Cryptanalysis of Cryptosystems Based on Non-commutative Skew Polynomials Vivien Dubois Jean-Gabriel Kammerer 459

Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem Charles Bouillaguet Jean-Charles Faugère Pierre-Alain Fouque Ludovic Perret 473

Author Index 495

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)