Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures | p. 1 |
Homomorphic Network Coding Signatures in the Standard Model | p. 17 |
Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model | p. 35 |
Attribute Based Encryption | |
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization | p. 53 |
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption | p. 71 |
Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts | p. 90 |
Number Theory | |
Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three | p. 109 |
On the Correct Use of the Negation Map in the Pollard rho Method | p. 128 |
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005 | p. 147 |
Protocols | |
(If) Size Matters: Size-Hiding Private Set Intersection | p. 156 |
Sub-linear, Secure Comparison with Two Non-colluding Parties | p. 174 |
Oblivious Transfer with Hidden Access Control Policies | p. 192 |
Chosen-Ciphertext Security | |
Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited | p. 210 |
Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security | p. 228 |
Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks | p. 246 |
Secure Blind Decryption | p. 265 |
Invited Talk | |
New Developments in Leakage-Resilient Cryptography (Abstract) | p. 283 |
Encryption | |
On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010 | p. 284 |
Fully Secure Accountable-Authority Identity-Based Encryption | p. 296 |
One-Pass HMQV and Asymmetric Key-Wrapping | p. 317 |
Linear Recurring Sequences for the UOV Key Generation | p. 335 |
On the Impossibility of Instantiating PSS in the Standard Model | p. 351 |
On-line Non-transferable Signatures Revisited | p. 369 |
Zero-Knowledge | |
Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra | p. 387 |
Signatures on Randomizable Ciphertexts | p. 403 |
Revocation for Delegatable Anonymous Credentials | p. 423 |
Cryptanalysis | |
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants | p. 441 |
Cryptanalysis of Cryptosystems Based on Non-commutative Skew Polynomials | p. 459 |
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem | p. 473 |
Author Index | p. 495 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.