Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Public Key Cryptography – PKC 2008 - 11th International Workshop on Practice and Theory in Public-Key

Public Key Cryptography – PKC 2008

11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, Proceedings

Cramer, Ronald (Ed.)

2008, XIII, 402 p.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$59.95

(net) price for USA

ISBN 978-3-540-78440-1

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$79.95

(net) price for USA

ISBN 978-3-540-78439-5

free shipping for individuals worldwide

The book title is in reprint. You can already preorder it.


add to marked items

These are the Proceedings of the 11th International Workshop on Practice and Theory in Public Key Cryptography – PKC 2008. The workshop was held in Barcelona, Spain, March 9–12, 2008. It was sponsored by the International Association for Cryptologic Research (IACR; seewww. iacr. org), this year in cooperation with MAK, the Research GrouponMathematicsAppliedtoCryptographyatUPC,thePolytechnicalU- versityofCatalonia. The GeneralChair,CarlesPadr´ o,was responsiblefor cha- ing the LocalOrganizationCommittee, for handling publicity and for University attracting funding from sponsors. The PKC 2008 Program Committee (PC) consisted of 30 internationally renowned experts. Their names and a?liations are listed further on in these proceedings. By the September 7, 2007submission deadline the PC had received 71 submissions via the IACR Electronic Submission Server. The subsequent - lection process was divided into two phases, as usual. In the review phase each submissionwascarefullyscrutinizedbyatleastthreeindependentreviewers,and the review reports, often extensive,werecommittedtotheIACRWebReview System. These were taken as the starting point for the PC-wide Web-based d- cussion phase. During this phase, additional reports were provided as needed, and the PC eventually had some 258 reports at its disposal. In addition, the discussions generated more than 650 messages, all posted in the system. During the entire PC phase, which started on April 12, 2006 with the invitation by the PKC Steering Committee, and which continued until March 2008, more than 500 e-mail messages were communicated. Moreover, the PC received much - preciated assistance by a large body of external reviewers. Their names are also listed in these proceedings.

Content Level » Research

Keywords » Oracle - Public Key - RSA - Session - Signatur - algorithm - algorithms - architecture - authentication - certificateless encryption - cryptographic algorithms - digital signature schemes - elliptic curves - encryption methods - inversion oracles

Related subjects » Communication Networks - General Issues - Security and Cryptology - Software Engineering - Theoretical Computer Science

Table of contents 

Session I: Algebraic and Number Theoretical Cryptanalysis (I).- Total Break of the ?-IC Signature Scheme.- Recovering NTRU Secret Key from Inversion Oracles.- Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?.- Session II: Theory of Public Key Encryption.- Relations Among Notions of Plaintext Awareness.- Completely Non-malleable Encryption Revisited.- Invited Talk I.- Cryptographic Test Correction.- Session III: Digital Signatures (I).- Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results.- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures.- Proxy Signatures Secure Against Proxy Key Exposure.- Session IV: Identification, Broadcast and Key Agreement.- Lattice-Based Identification Schemes Secure Under Active Attacks.- Efficient Simultaneous Broadcast.- SAS-Based Group Authentication and Key Agreement Protocols.- Session V: Implementation of Fast Arithmetic.- An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm.- New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields.- Session VI: Digital Signatures (II).- Online-Untransferable Signatures.- Security of Digital Signature Schemes in Weakened Random Oracle Models.- A Digital Signature Scheme Based on CVP ???.- Session VII: Algebraic and Number Theoretical Cryptanalysis (II).- An Analysis of the Vector Decomposition Problem.- A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents.- Session VIII: Public Key Encryption.- Certificateless Encryption Schemes Strongly Secure in the Standard Model.- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption.- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Data Encryption.