Public-key cryptography-- PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26-March 1, 2013. Proceedings /
This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submi...
Corporate Authors: | International Workshop on Practice and Theory in Public Key Cryptography Nara-shi, Japan) |
---|---|
Other Authors: | International Workshop on Practice and Theory in Public Key Cryptography, Kurosawa, Kaoru., Hanaoka, Goichiro., SpringerLink (Online service) |
Format: | eBook |
Language: | English |
Published: |
Berlin ; New York :
Springer,
©2013.
Berlin ; New York : [2013] |
Physical Description: |
1 online resource. |
Series: |
Lecture notes in computer science ;
7778. LNCS sublibrary. Security and cryptology. |
Subjects: |
Summary: |
This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols. |
---|---|
Item Description: |
Homomorphic Encryption -- Packed Ciphertexts in LWE-Based Homomorphic Encryption / Zvika Brakerski, Craig Gentry, Shai Halevi -- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption / Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou -- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption / Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda, Shota Yamada -- Invited Talk (1) -- Functional Encryption: Origins and Recent Developments / Brent Waters -- Primitives -- Vector Commitments and Their Applications / Dario Catalano, Dario Fiore -- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS / Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou -- Cryptography Using Captcha Puzzles / Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia. Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications / San Ling, Khoa Nguyen, Damien Stehlé, Huaxiong Wang -- Functional Encryption/Signatures -- Decentralized Attribute-Based Signatures / Tatsuaki Okamoto, Katsuyuki Takashima -- On the Semantic Security of Functional Encryption Schemes / Manuel Barbosa, Pooya Farshim -- Attribute-Based Encryption with Fast Decryption / Susan Hohenberger, Brent Waters -- On RSA -- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors / Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu -- Combined Attack on CRT-RSA / Guillaume Barbu, Alberto Battistello, Guillaume Dabosville, Christophe Giraud -- IBE and IPE -- Revocable Identity-Based Encryption Revisited: Security Model and Construction / Jae Hong Seo, Keita Emura -- Improved (Hierarchical) Inner-Product Encryption from Lattices / Keita Xagawa -- Invited Talk (2). Techniques for Efficient Secure Computation Based on Yao's Protocol / Yehuda Lindell -- Key Exchange -- Non-Interactive Key Exchange / Eduarda S.V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson -- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages / Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval -- Signature Schemes I -- Tighter Reductions for Forward-Secure Signature Schemes / Michel Abdalla, Fabrice Ben Hamouda, David Pointcheval -- Tagged One-Time Signatures: Tight Security and Optimal Tag Size / Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited / Takahiro Matsuda, Goichiro Hanaoka -- Robust Encryption, Revisited / Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia -- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited / Zhengan Huang, Shengli Liu, Baodong Qin. Signature Schemes II -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures / Nuttapong Attrapadung, Benoît Libert, Thomas Peters -- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES / Ryo Nishimaki, Keita Xagawa -- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies / Kwangsu Lee, Dong Hoon Lee, Moti Yung -- New Constructions and Applications of Trapdoor DDH Groups / Yannick Seurin -- Protocols -- Rate-Limited Secure Function Evaluation: Definitions and Constructions / Özgür Dagdelen, Payman Mohassel, Daniele Venturi -- Verifiable Elections That Scale for Free / Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn -- On the Connection between Leakage Tolerance and Adaptive Security / Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel. International conference proceedings. Includes author index. This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols. With bibliographical references and index. English. |
Physical Description: |
1 online resource. |
Bibliography: |
With bibliographical references and index. |
ISBN: |
9783642363627 3642363628 364236361X 9783642363610 |
ISSN: |
0302-9743 ; |