10. PKC 2007: Beijing, China
- Tatsuaki Okamoto, Xiaoyun Wang:
Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings. Lecture Notes in Computer Science 4450, Springer 2007, ISBN 978-3-540-71676-1
Signatures I
- Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao:
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. 43-60
Invited Talk I
- Dima Ruinskiy, Adi Shamir, Boaz Tsaban:
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions. 61-75
Cryptanalysis
- Alex D. Myasnikov, Alexander Ushakov:
Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol. 76-88 - Daewan Han, Myung-Hwan Kim, Yongjin Yeom:
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. 107-117
Protocols I
- Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum:
Optimistic Fair Exchange in a Multi-user Setting. 118-133 - Huafei Zhu, Willy Susilo, Yi Mu:
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. 134-149
Signatures II
- Mihir Bellare, Sarah Shoup:
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles. 201-216 - Emmanuel Bresson, Dario Catalano, Rosario Gennaro:
Improved On-Line/Off-Line Threshold Signatures. 217-232
Multivariate Cryptosystems
- Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner:
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. 233-248 - Vivien Dubois, Louis Granboulan, Jacques Stern:
Cryptanalysis of HFE with Internal Perturbation. 249-265 - Jintai Ding, Christopher Wolf, Bo-Yin Yang:
l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. 266-281
Encryption
- Benoît Libert, Jean-Jacques Quisquater, Moti Yung:
Parallel Key-Insulated Public Key Encryption Without Random Oracles. 298-314 - Akinori Kawachi, Keisuke Tanaka, Keita Xagawa:
Multi-bit Cryptosystems Based on Lattice Problems. 315-329
Protocols II
- Juan A. Garay, Berry Schoenmakers, José Villegas:
Practical and Secure Solutions for Integer Comparison. 330-342 - Takashi Nishide, Kazuo Ohta:
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. 343-360 - Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart:
Identity-Based Traitor Tracing. 361-376
Invited Talk II
- Rafail Ostrovsky, William E. Skeith III:
A Survey of Single-Database Private Information Retrieval: Techniques and Applications. 393-411
Number Theoretic Techniques
- Noboru Kunihiro, Kaoru Kurosawa:
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA. 412-425 - Reza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko:
Efficient Pseudorandom Generators Based on the DDH Assumption. 426-441
Public-Key Infrastructure
- Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi:
A Closer Look at PKI: Security and Efficiency. 458-475