Public-key cryptography-- PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26-March 1, 2013. Proceedings /

This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submi...

Full description

Corporate Authors: International Workshop on Practice and Theory in Public Key Cryptography Nara-shi, Japan)
Other Authors: International Workshop on Practice and Theory in Public Key Cryptography, Kurosawa, Kaoru., Hanaoka, Goichiro., SpringerLink (Online service)
Format: eBook
Language: English
Published: Berlin ; New York : Springer, ©2013.
Berlin ; New York : [2013]
Physical Description: 1 online resource.
Series: Lecture notes in computer science ; 7778.
LNCS sublibrary. Security and cryptology.
Subjects:
Summary: This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols.
Item Description: Homomorphic Encryption -- Packed Ciphertexts in LWE-Based Homomorphic Encryption / Zvika Brakerski, Craig Gentry, Shai Halevi -- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption / Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou -- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption / Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda, Shota Yamada -- Invited Talk (1) -- Functional Encryption: Origins and Recent Developments / Brent Waters -- Primitives -- Vector Commitments and Their Applications / Dario Catalano, Dario Fiore -- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS / Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou -- Cryptography Using Captcha Puzzles / Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia.
Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications / San Ling, Khoa Nguyen, Damien Stehlé, Huaxiong Wang -- Functional Encryption/Signatures -- Decentralized Attribute-Based Signatures / Tatsuaki Okamoto, Katsuyuki Takashima -- On the Semantic Security of Functional Encryption Schemes / Manuel Barbosa, Pooya Farshim -- Attribute-Based Encryption with Fast Decryption / Susan Hohenberger, Brent Waters -- On RSA -- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors / Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu -- Combined Attack on CRT-RSA / Guillaume Barbu, Alberto Battistello, Guillaume Dabosville, Christophe Giraud -- IBE and IPE -- Revocable Identity-Based Encryption Revisited: Security Model and Construction / Jae Hong Seo, Keita Emura -- Improved (Hierarchical) Inner-Product Encryption from Lattices / Keita Xagawa -- Invited Talk (2).
Techniques for Efficient Secure Computation Based on Yao's Protocol / Yehuda Lindell -- Key Exchange -- Non-Interactive Key Exchange / Eduarda S.V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson -- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages / Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval -- Signature Schemes I -- Tighter Reductions for Forward-Secure Signature Schemes / Michel Abdalla, Fabrice Ben Hamouda, David Pointcheval -- Tagged One-Time Signatures: Tight Security and Optimal Tag Size / Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited / Takahiro Matsuda, Goichiro Hanaoka -- Robust Encryption, Revisited / Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia -- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited / Zhengan Huang, Shengli Liu, Baodong Qin.
Signature Schemes II -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures / Nuttapong Attrapadung, Benoît Libert, Thomas Peters -- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES / Ryo Nishimaki, Keita Xagawa -- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies / Kwangsu Lee, Dong Hoon Lee, Moti Yung -- New Constructions and Applications of Trapdoor DDH Groups / Yannick Seurin -- Protocols -- Rate-Limited Secure Function Evaluation: Definitions and Constructions / Özgür Dagdelen, Payman Mohassel, Daniele Venturi -- Verifiable Elections That Scale for Free / Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn -- On the Connection between Leakage Tolerance and Adaptive Security / Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel.
International conference proceedings.
Includes author index.
This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols.
With bibliographical references and index.
English.
Physical Description: 1 online resource.
Bibliography: With bibliographical references and index.
ISBN: 9783642363627
3642363628
364236361X
9783642363610
ISSN: 0302-9743 ;