000 05113nam a22006615i 4500
001 978-3-642-00468-1
003 DE-He213
005 20240730191808.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 _a9783642004681
_9978-3-642-00468-1
024 7 _a10.1007/978-3-642-00468-1
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aPublic Key Cryptography - PKC 2009
_h[electronic resource] :
_b12th International Conference on Practice and Theory in Public Key Cryptography Irvine, CA, USA, March 18-20, 2009, Proceedings /
_cedited by Stanislaw Jarecki, Gene Tsudik.
250 _a1st ed. 2009.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2009.
300 _aXI, 521 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v5443
505 0 _aNumber Theory -- Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint -- The Security of All Bits Using List Decoding -- A New Lattice Construction for Partial Key Exposure Attack for RSA -- Subset-Restricted Random Walks for Pollard rho Method on -- Applications and Protocols -- Signing a Linear Subspace: Signature Schemes for Network Coding -- Improving the Boneh-Franklin Traitor Tracing Scheme -- Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols -- Zero-Knowledge Proofs with Witness Elimination -- Multi-Party Protocols -- Distributed Public-Key Cryptography from Weak Secrets -- Asynchronous Multiparty Computation: Theory and Implementation -- Multi-Party Computation with Omnipresent Adversary -- Identity-Based Encryption -- Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data -- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts -- Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys -- Removing Escrow from Identity-Based Encryption -- Signatures -- On the Theory and Practice of Personal Digital Signatures -- Security of Blind Signatures under Aborts -- Security of Sanitizable Signatures Revisited -- Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures -- Encryption -- CCA-Secure Proxy Re-encryption without Pairings -- Compact CCA-Secure Encryption for Messages of Arbitrary Length -- Verifiable Rotation of Homomorphic Encryptions -- New Cryptosystems and Optimizations -- A Practical Key Recovery Attack on Basic TCHo -- An Algebraic Surface Cryptosystem -- Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication -- Group Signatures and Anonymous Credentials -- Revocable Group Signature Schemes with Constant Costs for Signing and Verifying -- An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials -- Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials.
520 _aThis book constitutes the refereed proceedings of the 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009, held in Irvine, CA, USA, in March 2009. The 28 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on number theory, applications and protocols, multi-party protocols, identity-based encryption, signatures, encryption, new cryptosystems and optimizations, as well as group signatures and anonymous credentials. .
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer networks .
_931572
650 0 _aComputer programming.
_94169
650 0 _aAlgorithms.
_93390
650 0 _aComputers and civilization.
_921733
650 0 _aElectronic data processing
_xManagement.
_9147341
650 1 4 _aCryptology.
_931769
650 2 4 _aComputer Communication Networks.
_9147342
650 2 4 _aProgramming Techniques.
_9147343
650 2 4 _aAlgorithms.
_93390
650 2 4 _aComputers and Society.
_931668
650 2 4 _aIT Operations.
_931703
700 1 _aJarecki, Stanislaw.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9147344
700 1 _aTsudik, Gene.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9147345
710 2 _aSpringerLink (Online service)
_9147346
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642004674
776 0 8 _iPrinted edition:
_z9783642004698
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v5443
_9147347
856 4 0 _uhttps://doi.org/10.1007/978-3-642-00468-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c93907
_d93907