PKC 2009:
Gene Tsudik (Ed.):
Public Key Cryptography - PKC 2009 - PKC 2009,
12th International Conference on Practice and Theory in Public Key Cryptography,
Irvine, CA, USA,
March 18-20, 2009
Proceedings.
PKC 2009
Irvine, CA, USA,
March 18-20, 2009
Organizational Committee
Program Chair : | Gene Tsudik | |
General Chair : | Stanislaw Jarecki |
Program Committee
Xavier Boyen |
Christian Cachin |
Jan Camenisch |
Jung Hee Cheon |
Jean-Sébastien Coron |
Nelly Fazio |
Bao Feng |
Pierre-Alain Fouque |
Juan A. Garay |
Rosario Gennaro |
Amir Herzberg |
Marc Joye |
Seny Kamara |
Aggelos Kiayias |
Eike Kiltz |
Javier Lopez |
Breno de Medeiros |
David Naccache |
Jesper Buus Nielsen |
Kenneth G. Paterson |
Benny Pinkas |
David Pointcheval |
Ahmad-Reza Sadeghi |
Reihaneh Safavi-Naini |
Nitesh Saxena |
Berry Schoenmakers |
Hovav Shacham |
Vitaly Shmatikov |
Igor E. Shparlinski |
Michael Steiner |
Serge Vaudenay |
Ivan Visconti |
Susanne Wetzel |
External Referees
-
Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint.
, 1-14,
Alexander May
,
Maike Ritzenhofen
bib info -
The Security of All Bits Using List Decoding.
, 15-33,
Paz Morillo
,
Carla Ràfols
bib info -
A New Lattice Construction for Partial Key Exposure Attack for RSA.
, 34-53,
Yoshinori Aono
bib info -
Subset-Restricted Random Walks for Pollard rho Method on F
p
m
.
, 54-67,
Jung Hee Cheon
,
Jin Hong
,
Minkyu Kim
bib info -
Signing a Linear Subspace: Signature Schemes for Network Coding.
, 68-87,
Dan Boneh
,
Jonathan Katz
,
Brent Waters
,
David Freeman
bib info -
Improving the Boneh-Franklin Traitor Tracing Scheme.
, 88-104,
Arjen K. Lenstra
,
Pascal Junod
,
Alexandre Karlov
bib info -
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols.
, 105-123,
Colin Boyd
,
Juan Manuel González Nieto
,
M. Choudary Gorantla
bib info -
Distributed Public-Key Cryptography from Weak Secrets.
, 139-159,
Michel Abdalla
,
David Pointcheval
,
Xavier Boyen
,
Céline Chevalier
bib info -
Asynchronous Multiparty Computation: Theory and Implementation.
, 160-179,
Ivan Damgård
,
Jesper Buus Nielsen
,
Martin Geisler
,
Mikkel Krøigaard
bib info -
Multi-Party Computation with Omnipresent Adversary.
, 180-195,
Josef Pieprzyk
,
Hossein Ghodosi
bib info -
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data.
, 196-214,
Jan Camenisch
,
Caroline Sheedy
,
Markulf Kohlweiss
,
Alfredo Rial
bib info -
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.
, 215-234,
Miyako Ohkubo
,
Koutarou Suzuki
,
Tetsutaro Kobayashi
,
Jae Hong Seo
bib info -
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys.
, 235-255,
Benoît Libert
,
Damien Vergnaud
bib info -
Removing Escrow from Identity-Based Encryption.
, 256-276,
Sherman S. M. Chow
bib info -
On the Theory and Practice of Personal Digital Signatures.
, 277-296,
Ivan Damgård
,
Gert Læssøe Mikkelsen
bib info -
Security of Blind Signatures under Aborts.
, 297-316,
Marc Fischlin
,
Dominique Schröder
bib info -
Security of Sanitizable Signatures Revisited.
, 317-336,
Marc Fischlin
,
Anja Lehmann
,
Dominique Schröder
,
Christina Brzuska
,
Tobias Freudenreich
,
Marcus Page
,
Jakob Schelbert
,
Florian Volk
bib info -
CCA-Secure Proxy Re-encryption without Pairings.
, 357-376,
Zhenfu Cao
,
Jun Shao
bib info -
Compact CCA-Secure Encryption for Messages of Arbitrary Length.
, 377-392,
Masayuki Abe
,
Tatsuaki Okamoto
,
Eike Kiltz
bib info -
Verifiable Rotation of Homomorphic Encryptions.
, 393-410,
Berry Schoenmakers
,
Boris Skoric
,
José Villegas
,
Sebastiaan de Hoogh
bib info -
A Practical Key Recovery Attack on Basic TCHo.
, 411-424,
Gregor Leander
,
Mathias Herrmann
bib info -
An Algebraic Surface Cryptosystem.
, 425-442,
Koichiro Akiyama
,
Yasuhiro Goto
,
Hideyuki Miyake
bib info -
Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication.
, 443-462,
Catherine H. Gebotys
,
Patrick Longa
bib info -
Revocable Group Signature Schemes with Constant Costs for Signing and Verifying.
, 463-480,
Toru Nakanishi
,
Nobuo Funabiki
,
Hiroki Fujii
,
Yuta Hira
bib info -
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials.
, 481-500,
Jan Camenisch
,
Markulf Kohlweiss
,
Claudio Soriente
bib info -
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials.
, 501-520,
Matthew Green
,
Susan Hohenberger
,
Scott E. Coull
bib info
Session I: Number Theory
Session II: Applications and Protocols
Session III: Multi-Party Protocols
Session IV: Identity-Based Encryption
Session V: Signatures
Session VI: Encryption
Session VII: New Cryptosystems & Optimizations
Session VIII: Group Signatures & Anonymous Credentials