Advances in cryptology : EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptogra
Author: EUROCRYPT (2004 : Interlaken, Switzerland), Cachin, Christian, Camenisch, Jan
Added by: sketch
Added Date: 2015-12-29
Language: eng
Subjects: Computers, Cryptography, Data transmission systems, Ordinateurs, Cryptographie, Données, Contrôle d'accès, Ordinateur, Cryptographie (Informatique), Transmission des données, Mesures de sécurité, Kryptologie, Transmission des données, Mesures de sécurité, Kryptologie
Publishers: Berlin ; New York : Springer
Collections: journals contributions, journals
ISBN Number: 3540219358, 9783540219354
Pages Count: 300
PPI Count: 300
PDF Count: 1
Total Size: 350.62 MB
PDF Size: 5.71 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Downloads: 391
Views: 441
Total Files: 18
Media Type: texts
Total Files: 5
Last Modified: 2023-05-26 03:17:49
Size: 17.67 KB
Description
Author: Christian Cachin, Jan L. Camenisch
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-21935-4
DOI: 10.1007/b97182
Table of Contents:
- Efficient Private Matching and Set Intersection
- Positive Results and Techniques for Obfuscation
- Secure Computation of the k
- Short Signatures Without Random Oracles
- Sequential Aggregate Signatures from Trapdoor Permutations
- On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission
- The Exact Price for Unconditionally Secure Asymmetric Cryptography
- On Generating the Initial Key in the Bounded-Storage Model
- Practical Large-Scale Distributed Key Generation
- Optimal Communication Complexity of Generic Multicast Key Distribution
- An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem
- Black-Box Composition Does Not Imply Adaptive Security
- Chosen-Ciphertext Security from Identity-Based Encryption
- Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
- Construction of Secure Random Curves of Genus 2 over Prime Fields
- Projective Coordinates Leak
- Security Proofs for Identity-Based Identification and Signature Schemes
- Concurrent Signatures
- The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
- Public-Key Steganography
Includes bibliographical references and index