PKC 2011:
Rosario Gennaro (Ed.):
Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography - PKC 2011,
Taormina,
Italy,
March 6-9, 2011
Proceedings.
PKC 2011
Italy,
March 6-9, 2011
Organizational Committee
Program Chairs : | Rosario Gennaro | |
General Chair : | Antonio Nicolosi and Nelly Fazio |
Program Committee
Masayuki Abe |
John Black |
Alexandra Boldyreva |
Colin Boyd |
Emmanuel Bresson |
Melissa Chase |
Paolo D |
Alexander W. Dent |
Stefan Dziembowski |
Dario Fiore |
Marc Fischlin |
Carmit Hazay |
Martin Hirt |
Stanislaw Jarecki |
Eike Kiltz |
Kaoru Kurosawa |
Yehuda Lindell |
Sebastia Martin |
Alexander May |
Jesper Buus Nielsen |
Bryan Parno |
Mario Di Raimondo |
Mike Rosulek |
Guy N. Rothblum |
Kazue Sako |
Berry Schoenmakers |
Thomas Shrimpton |
Nigel P. Smart |
Edlyn Teske |
Muthuramakrishnan Venkitasubramaniam |
External Referees
- Session 1: Signatures I
-
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
, 1,
Dan Boneh
,
David Mandell Freeman
bib info -
Homomorphic Network Coding Signatures in the Standard Model
, 17,
Nuttapong Attrapadung
,
Benoit Libert
bib info -
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model
, 35,
Tatsuaki Okamoto
,
Katsuyuki Takashima
bib info - Session 2: Attribute Based Encryption
-
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
, 53,
Brent Waters
bib info -
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
, 71,
Nuttapong Attrapadung
,
Goichiro Hanaoka
,
Noboru Kunihiro
,
Shota Yamada
bib info -
Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
, 90,
Nuttapong Attrapadung
,
Benoit Libert
,
Elie de Panafieu
bib info - Session 3: Number Theory
-
Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three
, 109,
Clemens Heuberger
,
Roberto Avanzi
bib info -
On the correct use of the negation map in the Pollard rho method
, 128,
Daniel J. Bernstein
,
Tanja Lange
,
Peter Schwabe
bib info - Cryptanalysis of the RSA Subgroup Assumption from TCC 2005 , 152, Jean-Sebastien Coron , Antoine Joux , Avradip Mandal , David Naccache , Mehdi Tibouch , bib info
- Session 4: Protocols
-
(If) Size Matters: Size-Hiding Private Set Intersection
, 156,
Giuseppe Ateniese
,
Gene Tsudik
,
Emiliano De Cristofaro
bib info -
Sub-Linear, Secure Comparison With Two Non-Colluding Parties
, 174,
Tomas Toft
bib info NULL -
Oblivious Transfer with Hidden Access Control Lists
, 192,
Jan Camenisch
,
Gregory Neven
,
Maria Dubovitskaya
,
Gregory Zaverucha
bib info - Session 5: Chosen-Ciphertext Security
- Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited , 219, Qixiang Mei , Bao Li , Xianhui Lu , Dingding Jia , bib info
-
Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security
, 228,
Robert H. Deng
,
Junzuo Lai
,
Shengli Liu
bib info -
Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks
, 246,
Kanta Matsuura
,
Takahiro Matsuda
bib info -
Secure Blind Decryption
, 265,
Matthew Green
bib info - Session 6: Invited Talk
- Session 10: Encryption
-
On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010
, 284,
Goichiro Hanaoka
,
Yunlei Zhao
,
Jian Weng
bib info -
Fully Secure Accountable-Authority Identity-Based Encryption
, 296,
Amit Sahai
,
Hakan Seyalioglu
bib info -
One-Pass HMQV and Asymmetric Key-Wrapping
, 317,
Shai Halevi
,
Hugo Krawczyk
bib info - Session 8: Signatures II
-
Linear Recurring Sequences for the UOV Key Generation
, 335,
Johannes Buchmann
,
Stanislav Bulygin
,
Albrecht Petzoldt
bib info -
On the Impossibility of Instantiating PSS in the Standard Model
, 351,
Avradip Mandal
,
Rishiraj Bhattacharyya
bib info -
On-line Non-transferable Signatures Revisited
, 369,
Kanta Matsuura
,
Jacob C.N. Schuldt
bib info - Session 9: Zero-Knowledge
-
Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra
, 387,
Jae Hong Seo
bib info -
Signatures on Randomizable Ciphertexts
, 403,
David Pointcheval
,
Damien Vergnaud
,
Georg Fuchsbauer
,
Olivier Blazy
bib info -
Revocation for Delegatable Anonymous Credentials
, 423,
Lan Nguyen
,
Tolga Acar
bib info - Session 7: Cryptanalysis
-
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants
, 441,
Jean-Charles Faugère
,
Ludovic Perret
,
Luk Bettale
bib info -
Cryptanalysis of Cryptosystems Based on Non-commutative Skew Polynomials
, 459,
Vivien Dubois
,
Jean-Gabriel Kammerer
bib info -
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem
, 473,
Pierre-Alain Fouque
,
Jean-Charles Faugèle
,
Ludovic Perret
,
Charles Bouillaguet
bib info