×

zbMATH — the first resource for mathematics

Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. (English) Zbl 1157.94004
Lecture Notes in Computer Science 5443. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). xi, 521 p. (2009).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1130.94002).
Indexed articles:
May, Alexander; Ritzenhofen, Maike, Implicit factoring: on polynomial time factoring given only an implicit hint, 1-14 [Zbl 1220.11152]
Morillo, Paz; Ràfols, Carla, The security of all bits using list decoding, 15-33 [Zbl 1220.94040]
Aono, Yoshinori, A new lattice construction for partial key exposure attack for RSA, 34-53 [Zbl 1220.94032]
Kim, Minkyu; Cheon, Jung Hee; Hong, Jin, Subset-restricted random walks for Pollard rho method on \({\mathbf{F}_{p^m}}\), 54-67 [Zbl 1227.94052]
Boneh, Dan; Freeman, David; Katz, Jonathan; Waters, Brent, Signing a linear subspace: Signature schemes for network coding, 68-87 [Zbl 1227.68024]
Junod, Pascal; Karlov, Alexandre; Lenstra, Arjen K., Improving the Boneh-Franklin traitor tracing scheme, 88-104 [Zbl 1227.94049]
Gorantla, M. Choudary; Boyd, Colin; González Nieto, Juan Manuel, Modeling key compromise impersonation attacks on group key exchange protocols, 105-123 [Zbl 1227.94046]
Kiayias, Aggelos; Zhou, Hong-Sheng, Zero-knowledge proofs with witness elimination, 124-138 [Zbl 1227.94051]
Abdalla, Michel; Boyen, Xavier; Chevalier, Céline; Pointcheval, David, Distributed public-key cryptography from weak secrets, 139-159 [Zbl 1227.94018]
Damgård, Ivan; Geisler, Martin; Krøigaard, Mikkel; Nielsen, Jesper Buus, Asynchronous multiparty computation: theory and implementation, 160-179 [Zbl 1227.68014]
Ghodosi, Hossein; Pieprzyk, Josef, Multi-party computation with omnipresent adversary, 180-195 [Zbl 1227.68015]
Camenisch, Jan; Kohlweiss, Markulf; Rial, Alfredo; Sheedy, Caroline, Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data, 196-214 [Zbl 1227.94035]
Seo, Jae Hong; Kobayashi, Tetsutaro; Ohkubo, Miyako; Suzuki, Koutarou, Anonymous hierarchical identity-based encryption with constant size ciphertexts, 215-234 [Zbl 1227.94064]
Libert, Benoît; Vergnaud, Damien, Towards black-box accountable authority IBE with short ciphertexts and private keys, 235-255 [Zbl 1227.94053]
Chow, Sherman S. M., Removing escrow from identity-based encryption. New security notions and key management techniques, 256-276 [Zbl 1227.94039]
Damgård, Ivan; Mikkelsen, Gert Læssøe, On the theory and practice of personal digital signatures, 277-296 [Zbl 1227.94076]
Fischlin, Marc; Schröder, Dominique, Security of blind signatures under aborts, 297-316 [Zbl 1227.94078]
Brzuska, Christina; Fischlin, Marc; Freudenreich, Tobias; Lehmann, Anja; Page, Marcus; Schelbert, Jakob; Schröder, Dominique; Volk, Florian, Security of sanitizable signatures revisited, 317-336 [Zbl 1227.94073]
Matt, Brian J., Identification of multiple invalid signatures in pairing-based batched signatures, 337-356 [Zbl 1227.94080]
Shao, Jun; Cao, Zhenfu, CCA-secure proxy re-encryption without pairings, 357-376 [Zbl 1227.94065]
Abe, Masayuki; Kiltz, Eike; Okamoto, Tatsuaki, Compact CCA-secure encryption for messages of arbitrary length, 377-392 [Zbl 1227.94020]
de Hoogh, Sebastiaan; Schoenmakers, Berry; Škorić, Boris; Villegas, José, Verifiable rotation of homomorphic encryptions, 393-410 [Zbl 1227.94069]
Herrmann, Mathias; Leander, Gregor, A practical key recovery attack on basic TCHo, 411-424 [Zbl 1184.94237]
Akiyama, Koichiro; Goto, Yasuhiro; Miyake, Hideyuki, An algebraic surface cryptosystem, 425-442 [Zbl 1227.94024]
Longa, Patrick; Gebotys, Catherine, Fast multibase methods and other several optimizations for elliptic curve scalar multiplication, 443-462 [Zbl 1227.94054]
Nakanishi, Toru; Fujii, Hiroki; Hira, Yuta; Funabiki, Nobuo, Revocable group signature schemes with constant costs for signing and verifying, 463-480 [Zbl 1227.94081]
Camenisch, Jan; Kohlweiss, Markulf; Soriente, Claudio, An accumulator based on bilinear maps and efficient revocation for anonymous credentials, 481-500 [Zbl 1227.94074]
Coull, Scott; Green, Matthew; Hohenberger, Susan, Controlling access to an oblivious database using stateful anonymous credentials, 501-520 [Zbl 1227.94075]

MSC:
94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest
PDF BibTeX XML Cite
Full Text: DOI