PKC 2007 Accepted Papers (in order of submission) ------------------------------------------------------------------------------------------------------ High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems Jintai Ding (U. Cincinnati, USA/TU Darmstadt, Germany), Lei Hu (CAS, China), Xuyun Nie (CAS, China), Jianyu li (CAS, China), and John Wagner (U. of Cincinnati, USA) On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures Guilin Wang (I2R, Singapore), Joonsang Baek (I2R, Singapore), Duncan S. Wong (CUHK, China), and Feng Bao (I2R, Singapore) Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA Noboru Kunihiro (U. of Electro-Communication, Japan) and Kaoru Kurosawa (Ibaraki U., Japan) Self-Generated-Certificate Public Key Encryption without Pairing Junzuo Lai (Shanghai Jiaotong U., China) and Weidong Kou (Xidian U., China) A Direct Anonymous Attestation Scheme for Embedded Devices He Ge (Microsoft Corporation, USA) and Stephen R. Tate (U. of North Texas, USA) Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman Eike Kiltz (CWI, Netherlands) Cryptanalysis of HFE with Internal Perturbation Vivien Dubois (ENS, France), Louis Granboulan (ENS, France), and Jacques Stern (ENS, France) Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Godlfeld Key Exchange Protocol Alex D. Myasnikov (Stevens Institute of Tech., USA) and Alexander Ushakov (Stevens Institute of Tech., USA) Identity-Based Traitor Tracing M. Abdalla (ENS, France), A.W. Dent (Royal Holloway, U. of London, UK), J. Malone-Lee (U. of Bristol, UK), G. Neven (France Telecom, France), D.H. Phan (KU Leuven, Belgium), and N.P. Smart (U. of Bristol, UK) New Chosen-Ciphertext Attacks on NTRU Nicolas Gama (ENS, France) and Phong Q. Nguyen (ENS/CNRS, France) Efficient Ring Signatures Without Random Oracles Hovav Shacham (Weizmann Institute of Science, Israel) and Brent Waters (SRI Intl.) Anonymous Signatures Made Easy Marc Fischlin (TU Darmstadt, Germany) Parallel Key-Insulated Public Key Encryption Without Random Oracles Benoit Libert (UCL, Belgium), Jean-Jacques Quisquater (UCL, Belgium), and Moti Yung (Columbia U., USA) Full-Domain Subgroup Hiding and Constant-Size Group Signatures Xavier Boyen (Voltage Inc., USA) and Brent Waters (SRI Intl.) Practical and Secure Solutions for Integer Comparison Juan Garay (Bell Labs, USA), Berry Schoenmakers (TU Eindhoven, Netherlands), and Jose Villegas (TU Eindhoven, USA) Multiparty Computation for Interval, Equality, and Comparison without Bit-Decomposition Protocol Takashi Nishide (U. of Electro-Communications/Hitachi Software Engineering, Japan) and Kazuo Ohta (U. of Electro-Communications, Japan) A Closer Look at PKI: Security and Efficiency A. Boldyreva (Georgia Institute of Tech., USA), M. Fischlin (TU Darmstadt, USA), A. Palacio (Bowdoin College, USA), and B. Warinschi (U. of Bristol, UK) Optimistic Fair Exchange in a Multi-User Setting Yevgeniy Dodis (New York U., USA), Pil Joong Lee (POSTECH, Korea), and Dae Hyun Yum (POSTECH, Korea) Traceable Ring Signature Eiichiro Fujisaki (NTT, Japan) and Koutarou Suzuki (NTT, Japan) Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles Mihir Bellare (UCSD, USA) and Sarah Shoup (UCSD, USA) Multi-Bit Cryptosystems Based on Lattice Problems Akinori Kawachi (Tokyo Institute of Tech., Japan), Keisuke Tanaka (Tokyo Institute of Tech., Japan), and Keita Xagawa (Tokyo Institute of Tech., Japan) Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003 Daewan Han (NSRI, Korea), Myung-Hwan Kim (Seoul National U., Korea), and Yongjin Yeom (NSRI, Korea) Efficient Pseudorandom Generators Based on the DDH Assumption Reza Rezaeian Farashahi (TU Eindhoven, Netherlands/TU Isfahan, Iran), Berry Schoenmakers (TU Eindhoven, Netherlands), and Andrey Sidorenko (TU Eindhoven, Netherlands) Knowledge-Binding Commitments with Applications in Time-Stamping Ahto Buldas (Cybernetica AS/Tallin Univserity of Tech./U. of Tartu, Estonia) and Sven Laur (TU Helsinki, Finland) Verifiable Shuffle of Large Size Ciphertexts Jens Groth (UCLA, USA) and Steve Lu (UCLA, USA) $\ell$-Invertible Cycles for Multivariate Quadratic Public Key Cryptography Jintai Ding (U. Cincinnati, USA/TU Darmstadt, Germany), Christopher Wolf (ENS, France), and Bo-Yin Yang (Academia Sinica and TWISC, China) Fast Batch Verification of Multiple Signatures Jung Hee Cheon (Seoul National U., Korea) and Jeong Hyun Yi (Samsung, Korea) Improved On-Line/Off-Line Threshold Signatures Emmanuel Bresson (DCSSI, France), Dario Catalano (Universita di Catania, Italy), and Rosario Gennaro (IBM, USA) Multi-party Stand-alone and Setup-free Verifiably Committed Signatures Huafei Zhu (I2R, A-Star, Singapore), Willy Susilo (U. of Wollongong, Australia), and Yi Mu (U. of Wollongong, Australia) ------------------------------------------------------------------------------------------------------