Shaoquan Jiang, Guang Gong (auth.), Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan (eds.)3540223797, 9783540223795, 9783540278009
Table of contents :
Front Matter….Pages –
Multi-service Oriented Broadcast Encryption….Pages 1-11
Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme….Pages 12-23
Linear Code Implies Public-Key Traitor Tracing with Revocation ….Pages 24-35
TTS without Revocation Capability Secure Against CCA2….Pages 36-49
Single Database Private Information Retrieval with Logarithmic Communication….Pages 50-61
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions….Pages 62-73
Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing….Pages 74-85
NGSCB: A Trusted Open System….Pages 86-97
The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers….Pages 98-109
Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2….Pages 110-122
The Related-Key Rectangle Attack – Application to SHACAL-1….Pages 123-136
Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1….Pages 137-148
The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders….Pages 149-156
Analysis of a Conference Scheme Under Active and Passive Attacks….Pages 157-163
Cryptanalysis of Two Password-Authenticated Key Exchange Protocols….Pages 164-175
Analysis and Improvement of Micali’s Fair Contract Signing Protocol….Pages 176-187
Digital Signature Schemes with Domain Parameters….Pages 188-199
Generic Construction of Certificateless Signature….Pages 200-211
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model….Pages 212-223
How to Re-use Round Function in Super-Pseudorandom Permutation….Pages 224-235
How to Remove MAC from DHIES….Pages 236-247
Symmetric Key Authentication Services Revisited….Pages 248-261
Improvements to the Point Halving Algorithm….Pages 262-276
Theoretical Analysis of XL over Small Fields….Pages 277-288
A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks….Pages 289-300
A Mobile Agent System Providing Offer Privacy….Pages 301-312
Identity-Based Strong Designated Verifier Signature Schemes….Pages 313-324
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups….Pages 325-335
A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups….Pages 336-347
Convertible Nominative Signatures….Pages 348-357
Protocols with Security Proofs for Mobile Applications….Pages 358-369
Secure Bilinear Diffie-Hellman Bits….Pages 370-378
Weak Property of Malleability in NTRUSign….Pages 379-390
Information Security Risk Assessment, Aggregation, and Mitigation….Pages 391-401
A Weighted Graph Approach to Authorization Delegation and Conflict Resolution….Pages 402-413
Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems….Pages 414-426
Unconditionally Secure Encryption Under Strong Attacks….Pages 427-439
ManTiCore: Encryption with Joint Cipher-State Authentication….Pages 440-453
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks….Pages 454-465
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks….Pages 466-477
Fault Attacks on Signature Schemes….Pages 478-491
Back Matter….Pages –
Reviews
There are no reviews yet.