Michael J. Freedman, Kobbi Nissim, Benny Pinkas (auth.), Christian Cachin, Jan L. Camenisch (eds.)3540219358, 9783540219354, 9783540246763
Table of contents :
Front Matter….Pages –
Efficient Private Matching and Set Intersection….Pages 1-19
Positive Results and Techniques for Obfuscation….Pages 20-39
Secure Computation of the k th -Ranked Element….Pages 40-55
Short Signatures Without Random Oracles….Pages 56-73
Sequential Aggregate Signatures from Trapdoor Permutations….Pages 74-90
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission….Pages 91-108
The Exact Price for Unconditionally Secure Asymmetric Cryptography….Pages 109-125
On Generating the Initial Key in the Bounded-Storage Model….Pages 126-137
Practical Large-Scale Distributed Key Generation….Pages 138-152
Optimal Communication Complexity of Generic Multicast Key Distribution….Pages 153-170
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem….Pages 171-188
Black-Box Composition Does Not Imply Adaptive Security….Pages 189-206
Chosen-Ciphertext Security from Identity-Based Encryption….Pages 207-222
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles….Pages 223-238
Construction of Secure Random Curves of Genus 2 over Prime Fields….Pages 239-256
Projective Coordinates Leak….Pages 257-267
Security Proofs for Identity-Based Identification and Signature Schemes….Pages 268-286
Concurrent Signatures….Pages 287-305
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures….Pages 306-322
Public-Key Steganography….Pages 323-341
Immunizing Encryption Schemes from Decryption Errors….Pages 342-360
Secure Hashed Diffie-Hellman over Non-DDH Groups….Pages 361-381
On Simulation-Sound Trapdoor Commitments….Pages 382-400
Hash Function Balance and Its Impact on Birthday Attacks….Pages 401-418
Multi-party Computation with Hybrid Security….Pages 419-438
On the Hardness of Information-Theoretic Multiparty Computation….Pages 439-455
Dining Cryptographers Revisited….Pages 456-473
Algebraic Attacks and Decomposition of Boolean Functions….Pages 474-491
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited….Pages 492-505
Public Key Encryption with Keyword Search….Pages 506-522
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data….Pages 523-540
Merkle Tree Traversal in Log Space and Time….Pages 541-554
Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3….Pages 555-570
Traceable Signatures….Pages 571-589
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme….Pages 590-608
Anonymous Identification in Ad Hoc Groups….Pages 609-626
Back Matter….Pages –
Reviews
There are no reviews yet.