International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings. — Springer, 2004. — 641 p. — ISBN: 978-3-540-21935-4.
Efficient Private Matching and Set Intersection
Positive Results and Techniques for Obfuscation
Secure Computation of the k
Short Signatures Without Random Oracles
Sequential Aggregate Signatures from Trapdoor Permutations
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission
The Exact Price for Unconditionally Secure Asymmetric Cryptography
On Generating the Initial Key in the Bounded-Storage Model
Practical Large-Scale Distributed Key Generation
Optimal Communication Complexity of Generic Multicast Key Distribution
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem
Black-Box Composition Does Not Imply Adaptive Security
Chosen-Ciphertext Security from Identity-Based Encryption
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
Construction of Secure Random Curves of Genus 2 over Prime Fields
Projective Coordinates Leak
Security Proofs for Identity-Based Identification and Signature Schemes
Concurrent Signatures
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
Public-Key Steganography