Advances in Cryptology – EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 3027

ISBN: 3540219358, 9783540219354, 9783540246763

Size: 4 MB (4670251 bytes)

Pages: 630/640

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Michael J. Freedman, Kobbi Nissim, Benny Pinkas (auth.), Christian Cachin, Jan L. Camenisch (eds.)3540219358, 9783540219354, 9783540246763

These are the proceedings of Eurocrypt 2004, the 23rd Annual Eurocrypt C- ference. The conference was organized by members of the IBM Zurich Research Laboratory in cooperation with IACR, the International Association for Cr- tologic Research. Theconferencereceivedarecordnumberof206submissions,outofwhichthe program committee selected 36 for presentation at the conference (three papers were withdrawn by the authors shortly after submission). These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. The conference program also featured two invited talks. The ?rst one was the 2004 IACR Distinguished Lecture given by Whit?eld Di?e. The second invited talk was by Ivan Damg? ard who presented “Paradigms for Multiparty Computation. ” The traditional rump session with short informal talks on recent results was chaired by Arjen Lenstra. The reviewing process was a challenging task, and many good submissions had to be rejected. Each paper was reviewed independently by at least three members of the program committee, and papers co-authored by a member of the program committee were reviewed by at least six (other) members. The individual reviewing phase was followed by profound and sometimes lively d- cussions about the papers, which contributed a lot to the quality of the ?nal selection. Extensive comments were sent to the authors in most cases.

Table of contents :
Front Matter….Pages –
Efficient Private Matching and Set Intersection….Pages 1-19
Positive Results and Techniques for Obfuscation….Pages 20-39
Secure Computation of the k th -Ranked Element….Pages 40-55
Short Signatures Without Random Oracles….Pages 56-73
Sequential Aggregate Signatures from Trapdoor Permutations….Pages 74-90
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission….Pages 91-108
The Exact Price for Unconditionally Secure Asymmetric Cryptography….Pages 109-125
On Generating the Initial Key in the Bounded-Storage Model….Pages 126-137
Practical Large-Scale Distributed Key Generation….Pages 138-152
Optimal Communication Complexity of Generic Multicast Key Distribution….Pages 153-170
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem….Pages 171-188
Black-Box Composition Does Not Imply Adaptive Security….Pages 189-206
Chosen-Ciphertext Security from Identity-Based Encryption….Pages 207-222
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles….Pages 223-238
Construction of Secure Random Curves of Genus 2 over Prime Fields….Pages 239-256
Projective Coordinates Leak….Pages 257-267
Security Proofs for Identity-Based Identification and Signature Schemes….Pages 268-286
Concurrent Signatures….Pages 287-305
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures….Pages 306-322
Public-Key Steganography….Pages 323-341
Immunizing Encryption Schemes from Decryption Errors….Pages 342-360
Secure Hashed Diffie-Hellman over Non-DDH Groups….Pages 361-381
On Simulation-Sound Trapdoor Commitments….Pages 382-400
Hash Function Balance and Its Impact on Birthday Attacks….Pages 401-418
Multi-party Computation with Hybrid Security….Pages 419-438
On the Hardness of Information-Theoretic Multiparty Computation….Pages 439-455
Dining Cryptographers Revisited….Pages 456-473
Algebraic Attacks and Decomposition of Boolean Functions….Pages 474-491
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited….Pages 492-505
Public Key Encryption with Keyword Search….Pages 506-522
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data….Pages 523-540
Merkle Tree Traversal in Log Space and Time….Pages 541-554
Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3….Pages 555-570
Traceable Signatures….Pages 571-589
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme….Pages 590-608
Anonymous Identification in Ad Hoc Groups….Pages 609-626
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Advances in Cryptology – EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings”
Shopping Cart
Scroll to Top