Public Key Cryptography - PKC 2009
Springer Berlin (Verlag)
978-3-642-00467-4 (ISBN)
Number Theory.- Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint.- The Security of All Bits Using List Decoding.- A New Lattice Construction for Partial Key Exposure Attack for RSA.- Subset-Restricted Random Walks for Pollard rho Method on .- Applications and Protocols.- Signing a Linear Subspace: Signature Schemes for Network Coding.- Improving the Boneh-Franklin Traitor Tracing Scheme.- Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols.- Zero-Knowledge Proofs with Witness Elimination.- Multi-Party Protocols.- Distributed Public-Key Cryptography from Weak Secrets.- Asynchronous Multiparty Computation: Theory and Implementation.- Multi-Party Computation with Omnipresent Adversary.- Identity-Based Encryption.- Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data.- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.- Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys.- Removing Escrow from Identity-Based Encryption.- Signatures.- On the Theory and Practice of Personal Digital Signatures.- Security of Blind Signatures under Aborts.- Security of Sanitizable Signatures Revisited.- Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures.- Encryption.- CCA-Secure Proxy Re-encryption without Pairings.- Compact CCA-Secure Encryption for Messages of Arbitrary Length.- Verifiable Rotation of Homomorphic Encryptions.- New Cryptosystems and Optimizations.- A Practical Key Recovery Attack on Basic TCHo.- An Algebraic Surface Cryptosystem.- Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication.- Group Signatures and Anonymous Credentials.- Revocable Group Signature Schemes with Constant Costs for Signing and Verifying.- An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials.- Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials.
Erscheint lt. Verlag | 25.2.2009 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 526 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 813 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | algebraic surface • Algorithm analysis and problem complexity • anonymity • authentication • bit security • certificateless encryption • Cryptanalysis • cryptographic algorithms • cryptographic protocols • cryptography • digital signature schemes • Efficiency • Elliptic Curves • encryption methods • group signatures • Hardcover, Softcover / Informatik, EDV/Informatik • Identity • identity-based encryption • insider attacks • Multi-Party Computation • multivariate cryptosystems • oblivious keyword search • one-way function • Optimization • pairings • PKI techniques • provable security • Public Key • public key cryptanalysis • Public Key Cryptography • Public Key Cryptosystems • public key encryption • random oracle • RSA attacks • searchable encryption • standard model • stream cipher • wireless networks |
ISBN-10 | 3-642-00467-9 / 3642004679 |
ISBN-13 | 978-3-642-00467-4 / 9783642004674 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich