Accepted Papers
- High Order Linearization Equation (HOLE) Attack
on Multivariate Public Key Cryptosystems by
Jintai Ding (U. Cincinnati, USA/TU Darmstadt,
Germany), Lei Hu (CAS, China), Xuyun Nie (CAS, China), Jianyu li (CAS, China),
and John Wagner (U. of Cincinnati, USA)
- On the Generic and Efficient Constructions of Secure
Designated Confirmer Signatures by Guilin Wang (I2R, Singapore), Joonsang Baek (I2R, Singapore),
Duncan S. Wong (CUHK, China), and Feng Bao (I2R, Singapore)
- Deterministic Polynomial Time Equivalence between
Factoring and Key-Recovery Attack on Takagi's RSA
by Noboru Kunihiro (U. of Electro-Communication,
Japan) and Kaoru Kurosawa (Ibaraki U., Japan)
- Self-Generated-Certificate Public Key Encryption
without Pairing by Junzuo Lai (Shanghai Jiaotong U., China) and Weidong Kou
(Xidian U., China)
- A Direct Anonymous Attestation Scheme for Embedded
Devices by He Ge
(Microsoft Corporation, USA) and Stephen R. Tate (U. of North Texas,
USA)
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap
Hashed Diffie-Hellman by Eike Kiltz (CWI, Netherlands)
- Cryptanalysis of HFE with Internal Perturbation
by Vivien Dubois (ENS,
France), Louis Granboulan (ENS, France), and Jacques Stern (ENS,
France)
- Length Based Attack and Braid Groups: Cryptanalysis of
Anshel-Anshel-Godlfeld Key Exchange Protocol by
Alex D. Myasnikov (Stevens Institute of Tech.,
USA) and Alexander Ushakov (Stevens Institute of Tech., USA)
- Identity-Based Traitor Tracing
by M. Abdalla (ENS, France), A.W. Dent
(Royal Holloway, U. of London, UK), J. Malone-Lee (U. of Bristol, UK), G. Neven
(France Telecom, France), D.H. Phan (KU Leuven, Belgium), and N.P. Smart (U. of
Bristol, UK)
- New Chosen-Ciphertext Attacks on NTRU
by Nicolas Gama (ENS, France) and
Phong Q. Nguyen (ENS/CNRS, France)
- Efficient Ring Signatures Without Random Oracles
by Hovav Shacham (Weizmann
Institute of Science, Israel) and Brent Waters (SRI Intl.)
- Anonymous Signatures Made Easy
by Marc Fischlin (TU Darmstadt,
Germany)
- Parallel Key-Insulated Public Key Encryption Without
Random Oracles by Benoit Libert (UCL, Belgium), Jean-Jacques Quisquater (UCL,
Belgium), and Moti Yung (Columbia U., USA)
- Full-Domain Subgroup Hiding and Constant-Size Group
Signatures by Xavier
Boyen (Voltage Inc., USA) and Brent Waters (SRI Intl.)
- Practical and Secure Solutions for Integer
Comparison by Juan
Garay (Bell Labs, USA), Berry Schoenmakers (TU Eindhoven, Netherlands), and
Jose Villegas (TU Eindhoven, USA)
- Multiparty Computation for Interval, Equality, and
Comparison without Bit-Decomposition Protocol by
Takashi Nishide (U. of
Electro-Communications/Hitachi Software Engineering, Japan) and Kazuo Ohta (U.
of Electro-Communications, Japan)
- A Closer Look at PKI: Security and Efficiency
by A. Boldyreva (Georgia
Institute of Tech., USA), M. Fischlin (TU Darmstadt, USA), A. Palacio (Bowdoin
College, USA), and B. Warinschi (U. of Bristol, UK)
- Optimistic Fair Exchange in a Multi-User Setting
by Yevgeniy Dodis (New York
U., USA), Pil Joong Lee (POSTECH, Korea), and Dae Hyun Yum (POSTECH,
Korea)
- Traceable Ring Signature by
Eiichiro Fujisaki (NTT, Japan) and Koutarou
Suzuki (NTT, Japan)
- Two-Tier Signatures, Strongly Unforgeable Signatures,
and Fiat-Shamir without Random Oracles by
Mihir Bellare (UCSD, USA) and Sarah Shoup (UCSD,
USA)
- Multi-Bit Cryptosystems Based on Lattice
Problems by Akinori
Kawachi (Tokyo Institute of Tech., Japan), Keisuke Tanaka (Tokyo Institute of
Tech., Japan), and Keita Xagawa (Tokyo Institute of Tech., Japan)
- Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from
PKC 2003 by Daewan
Han (NSRI, Korea), Myung-Hwan Kim (Seoul National U., Korea), and Yongjin Yeom
(NSRI, Korea)
- Efficient Pseudorandom Generators Based on the DDH
Assumption by Reza
Rezaeian Farashahi (TU Eindhoven, Netherlands/TU Isfahan, Iran), Berry
Schoenmakers (TU Eindhoven, Netherlands), and Andrey Sidorenko (TU Eindhoven,
Netherlands)
- Knowledge-Binding Commitments with Applications in
Time-Stamping by Ahto
Buldas (Cybernetica AS/Tallin Univserity of Tech./U. of Tartu, Estonia) and
Sven Laur (TU Helsinki, Finland)
- Verifiable Shuffle of Large Size Ciphertexts
by Jens Groth (UCLA, USA)
and Steve Lu (UCLA, USA)
- $\ell$-Invertible Cycles for Multivariate Quadratic
Public Key Cryptography by Jintai Ding (U. Cincinnati, USA/TU Darmstadt, Germany),
Christopher Wolf (ENS, France), and Bo-Yin Yang (Academia Sinica and TWISC,
China)
- Fast Batch Verification of Multiple Signatures
by Jung Hee Cheon (Seoul
National U., Korea) and Jeong Hyun Yi (Samsung, Korea)
- Improved On-Line/Off-Line Threshold Signatures
by Emmanuel Bresson (DCSSI,
France), Dario Catalano (Universita di Catania, Italy), and Rosario Gennaro
(IBM, USA)
- Multi-party Stand-alone and Setup-free Verifiably
Committed Signatures by Huafei Zhu (I2R, A-Star, Singapore), Willy Susilo (U. of
Wollongong, Australia), and Yi Mu (U. of Wollongong, Australia)
Also available in TXT format.