default search action
13. PKC 2011: Taormina, Italy
- Dario Catalano, Nelly Fazio, Rosario Gennaro, Antonio Nicolosi:
Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings. Lecture Notes in Computer Science 6571, Springer 2011, ISBN 978-3-642-19378-1
Signatures I
- Dan Boneh, David Mandell Freeman:
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures. 1-16 - Nuttapong Attrapadung, Benoît Libert:
Homomorphic Network Coding Signatures in the Standard Model. 17-34 - Tatsuaki Okamoto, Katsuyuki Takashima:
Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model. 35-52
Attribute Based Encryption
- Brent Waters:
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. 53-70 - Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption. 71-89 - Nuttapong Attrapadung, Benoît Libert, Elie de Panafieu:
Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. 90-108
Number Theory
- Roberto Maria Avanzi, Clemens Heuberger:
Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three. 109-127 - Daniel J. Bernstein, Tanja Lange, Peter Schwabe:
On the Correct Use of the Negation Map in the Pollard rho Method. 128-146 - Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, Mehdi Tibouchi:
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. 147-155
Protocols
- Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik:
(If) Size Matters: Size-Hiding Private Set Intersection. 156-173 - Tomas Toft:
Sub-linear, Secure Comparison with Two Non-colluding Parties. 174-191 - Jan Camenisch, Maria Dubovitskaya, Gregory Neven, Gregory M. Zaverucha:
Oblivious Transfer with Hidden Access Control Policies. 192-209
Chosen-Ciphertext Security
- Qixiang Mei, Bao Li, Xianhui Lu, Dingding Jia:
Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited. 210-227 - Junzuo Lai, Robert H. Deng, Shengli Liu:
Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security. 228-245 - Takahiro Matsuda, Kanta Matsuura:
Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks. 246-264 - Matthew Green:
Secure Blind Decryption. 265-282
Invited Talk
- Vinod Vaikuntanathan:
New Developments in Leakage-Resilient Cryptography. 283
Encryption
- Jian Weng, Yunlei Zhao, Goichiro Hanaoka:
On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010. 284-295 - Amit Sahai, Hakan Seyalioglu:
Fully Secure Accountable-Authority Identity-Based Encryption. 296-316 - Shai Halevi, Hugo Krawczyk:
One-Pass HMQV and Asymmetric Key-Wrapping. 317-334
Signatures II
- Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann:
Linear Recurring Sequences for the UOV Key Generation. 335-350 - Rishiraj Bhattacharyya, Avradip Mandal:
On the Impossibility of Instantiating PSS in the Standard Model. 351-368 - Jacob C. N. Schuldt, Kanta Matsuura:
On-line Non-transferable Signatures Revisited. 369-386
Zero-Knowledge
- Jae Hong Seo:
Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra. 387-402 - Olivier Blazy, Georg Fuchsbauer, David Pointcheval, Damien Vergnaud:
Signatures on Randomizable Ciphertexts. 403-422 - Tolga Acar, Lan Nguyen:
Revocation for Delegatable Anonymous Credentials. 423-440
Cryptanalysis
- Luk Bettale, Jean-Charles Faugère, Ludovic Perret:
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants. 441-458 - Vivien Dubois, Jean-Gabriel Kammerer:
Cryptanalysis of Cryptosystems Based on Non-commutative Skew Polynomials. 459-472 - Charles Bouillaguet, Jean-Charles Faugère, Pierre-Alain Fouque, Ludovic Perret:
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem. 473-493
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.