## Advances in Cryptology - EUROCRYPT '98: International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, ProceedingsThis book constitutes the refereed proceedings of the 1998 International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT '98, held in Espoo, Finland, in May/June 1998. The book presents 44 revised full papers selected from a total of 161 submissions. The papers are organized in sections on distributed cryptography, complexity, cryptanalysis of block ciphers, computational algorithms, paradigms for symmetric systems, public key cryptosystems, multi-party computation, digital signatures, Boolean functions, combinatorial design and analysis, elliptic curve systems, and electronic commerce and payment. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

Autorecoverable autocertifiable cryptosystems | 17 |

A practical and provably secure scheme for publicly verifiable secret | 32 |

Reductions and Lower Bounds | 47 |

Copyright | |

33 other sections not shown

### Other editions - View all

### Common terms and phrases

access structure Advances in Cryptology adversary algorithm assume assumption attack authentication bits blind signature block cipher Boolean functions chooses chosen ciphertext clients commitment scheme complexity Computer Science construction Crypto cryptographic Cryptology cryptosystem decryption defined denote Diffie-Hellman discrete logarithm distribution efficient ElGamal elliptic curve equations escrow Eurocrypt exists exponentiation factoring given hash function input integer interactive key escrow Lecture Notes Lemma linear LNCS lower bound mod q modulo multicast multicast lines multiple nonlinearity Notes in Computer oblivious transfer obtain one-way output pair parameters plaintext players polynomial prime probabilistic problem Proc proof prove public key queries quorum systems random oracle random oracle model randomly reduction result satisfies secret key secret sharing scheme Section server signature scheme simulator Springer Springer-Verlag subset t-linear permutations Theorem undeniable signature variables verifier weak key zero-knowledge zero-knowledge proof