PKC 2006:
New York, NY, USA
Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin (Eds.):
Public Key Cryptography -
PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography,
New York, NY, USA,
April 24-26, 2006,
Proceedings.
Ronald Cramer | CWI and Leiden University, The Netherlands | |
Yvo Desmedt | University College London, United Kingdom | |
Hideki Imai (Chair) | University of Tokyo, Japan | |
Kwangjo Kim | Information and Communications University, Korea | |
David Naccache | École Normale Supérieure, France | |
Tatsuaki Okamoto | NTT Labs, Japan | |
Jacques Stern | École Normale Supérieure, France | |
Moti Yung | RSA Laboratories and Columbia University, USA | |
Yuliang Zheng (Secretary) | University of North Carolina at Charlotte, USA |
Conference and Program Chair | Moti Yung | |
General and Sponsorship Chair | Yevgeniy Dodis | |
Publicity and Publication Chair | Aggelos Kiayias | |
General and Local Arrangements Chair | Tal Malkin |
- EADS
- Morgan Stanley
- Gemplus
- NTT DoCoMo
- Microsoft
- RSA Security
Masayuki Abe | NTT Japan | |
Feng Bao | I2R, Singapore | |
Paulo S. L. M. Barreto | University of Sâo Paulo, Brazil | |
Amos Beimel | Ben Gurion University, Israel | |
Xavier Boyen | Voltage Technology, USA | |
Serge Fehr | CWI, The Netherlands | |
Pierre-Alain Fouque | ENS Paris, France | |
Juan Garay | Bell Labs, USA | |
Rosario Gennaro | IBM Research, USA | |
Nick Howgrave-Graham | NTRU Cryptosystems, USA | |
Dong Hoon Lee | Korea University, Korea | |
Wenbo Mao | HP Labs, China | |
Alexander May | Paderborn University, Germany | |
David Naccache | ENS, France | |
Rafail Ostrovsky | UCLA, USA | |
Kenny Paterson | Royal Holloway, U. of London, UK | |
Giuseppe Persiano | University of Salerno, Italy | |
Benny Pinkas | Haifa University, Israel | |
Leonid Reyzin | Boston University, USA | |
Kazue Sako | NEC Japan | |
Jean-Sébastien Coron | University of Luxembourg | |
Alice Silverberg | U. C. Irvine, USA | |
Jessica Staddon | PARC, USA | |
Ron Steinfeld | Macquarie University, Australia | |
Edlyn Teske | University of Waterloo, Canada | |
Wen-Guey Tzeng | NCTU, Taiwan | |
Susanne Wetzel | Stevens Institute, USA | |
Yiqun Lisa Yin | Independent Consultant, USA | |
Adam Young | MITRE, USA | |
Moti Yung | RSA Labs and Columbia U., USA |
External Referees
Cryptanalysis and Protocol Weaknesses
-
Daniel Bleichenbacher
,
Alexander May
:
New Attacks on RSA with Small Secret CRT-Exponents , ( .ps ). 1-13
BibTeX -
Christian Wieschebrink
:
An Attack on a Modified Niederreiter Encryption Scheme , ( .ps ). 14-26
BibTeX -
Sébastien Kunz-Jacques
,
Gwenaëlle Martinet
,
Guillaume Poupard
,
Jacques Stern
:
Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm , ( .ps ). 27-43
BibTeX
Distributed Crypto-computing
-
Payman Mohassel
,
Matthew K. Franklin
:
Efficient Polynomial Operations in the Shared-Coefficients Setting , ( .ps ). 44-57
BibTeX -
Chris Crutchfield
,
David Molnar
,
David Turner
,
David Wagner
:
Generic On-Line/Off-Line Threshold Signatures , ( .ps ). 58-74
BibTeX -
Ivan Damgård
,
Rune Thorbek
:
Linear Integer Secret Sharing and Distributed Exponentiation , ( .ps ). 75-90
BibTeX
Encryption Methods
-
Benoît Chevallier-Mames
,
Pascal Paillier
,
David Pointcheval
:
Encoding-Free ElGamal Encryption Without Random Oracles , ( .ps ). 91-104
BibTeX -
Goichiro Hanaoka
,
Yumiko Hanaoka
,
Hideki Imai
:
Parallel Key-Insulated Public Key Encryption , ( .ps ). 105-122
BibTeX -
Anna Lysyanskaya
,
Mira Meyerovich
:
Provably Secure Steganography with Imperfect Sampling , ( .ps ). 123-139
BibTeX
Cryptographic Hash and Applications
-
Ilya Mironov
:
Collision-Resistant No More: Hash-and-Sign Paradigm Revisited , ( .ps ). 140-156
BibTeX -
Ron Steinfeld
,
Josef Pieprzyk
,
Huaxiong Wang
:
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption , ( .ps ). 157-173
BibTeX
Number Theory Algorithms
-
An Commeine
,
Igor Semaev
:
An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve , ( .ps ). 174-190
BibTeX -
Christophe Doche
,
Thomas Icart
,
David R. Kohel
:
Efficient Scalar Multiplication by Isogeny Decompositions , ( .ps ). 191-206
BibTeX -
Daniel J. Bernstein
:
Curve25519: New Diffie-Hellman Speed Records , ( .ps ). 207-228
BibTeX
Pairing-Based Cryptography
-
Dan Boneh
,
Emily Shen
,
Brent Waters
:
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman , ( .ps ). 229-240
BibTeX -
Sanjit Chatterjee
,
Palash Sarkar
:
Generalization of the Selective-ID Security Model for HIBE Protocols , ( .ps ). 241-256
BibTeX -
Craig Gentry
,
Zulfikar Ramzan
:
Identity-Based Aggregate Signatures , ( .ps ). 257-273
BibTeX -
Eike Kiltz
:
On the Limitations of the Spread of an IBE-to-PKE Transformation , ( .ps ). 274-289
BibTeX
Cryptosystems Design and Analysis
-
Jintai Ding
,
Jason E. Gower
:
Inoculating Multivariate Schemes Against Differential Attacks , ( .ps ). 290-301
BibTeX -
Alexei G. Myasnikov
,
Vladimir Shpilrain
,
Alexander Ushakov
:
Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol , ( .ps ). 302-314
BibTeX -
Frédéric Muller
,
Frédéric Valette
:
High-Order Attacks Against the Exponent Splitting Protection , ( .ps ). 315-329
BibTeX
Signature and Identification
-
Kaoru Kurosawa
,
Katja Schmidt-Samoa
:
New Online/Offline Signature Schemes Without Random Oracles , ( .ps ). 330-346
BibTeX -
Guomin Yang
,
Duncan S. Wong
,
Xiaotie Deng
,
Huaxiong Wang
:
Anonymous Signature Schemes , ( .ps ). 347-363
BibTeX -
Kaoru Kurosawa
,
Swee-Huay Heng
:
The Power of Identification Schemes , ( .ps ). 364-377
BibTeX
Authentication and Key Establishment
-
Kristin Lauter
,
Anton Mityagin
:
Security Analysis of KEA Authenticated Key Exchange Protocol , ( .ps ). 378-394
BibTeX -
Sylvain Pasini
,
Serge Vaudenay
:
SAS-Based Authenticated Key Agreement , ( .ps ). 395-409
BibTeX -
Olivier Chevassut
,
Pierre-Alain Fouque
,
Pierrick Gaudry
,
David Pointcheval
:
The Twist-AUgmented Technique for Key Exchange , ( .ps ). 410-426
BibTeX -
Michel Abdalla
,
Emmanuel Bresson
,
Olivier Chevassut
,
David Pointcheval
:
Password-Based Group Key Exchange in a Constant Number of Rounds , ( .ps ). 427-442
BibTeX
Multi-party Computation
-
Cheng-Kang Chu
,
Wen-Guey Tzeng
:
Conditional Oblivious Cast , ( .ps ). 443-457
BibTeX -
Payman Mohassel
,
Matthew K. Franklin
:
Efficiency Tradeoffs for Malicious Two-Party Computation , ( .ps ). 458-473
BibTeX
PKI Techniques
-
Benoît Libert
,
Jean-Jacques Quisquater
:
On Constructing Certificateless Cryptosystems from Identity Based Encryption , ( .ps ). 474-490
BibTeX -
Tor E. Bjørstad
,
Alexander W. Dent
:
Building Better Signcryption Schemes with Tag-KEMs , ( .ps ). 491-507
BibTeX -
Sherman S. M. Chow
,
Colin Boyd
,
Juan Manuel González Nieto
:
Security-Mediated Certificateless Cryptography , ( .ps ). 508-524
BibTeX -
Isamu Teranishi
,
Kazue Sako
:
k -Times Anonymous Authentication with a Constant Proving Cost , ( .ps ). 525-542
BibTeX