Public-key cryptography -- PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings. Part I /

The two-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March 2016. The 34 revised papers presented were carefully reviewed and selected from 143 s...

Full description

Corporate Authors: International Workshop on Practice and Theory in Public Key Cryptography Taipei, Taiwan)
Other Authors: International Workshop on Practice and Theory in Public Key Cryptography, Cheng, Chen-Mou (Computer scientist), Chung, Kai-Min,, Persiano, Giuseppe,, Yang, Bo-Yin,, SpringerLink (Online service)
Format: eBook
Language: English
Published: Berlin : Springer, 2016.
Physical Description: 1 online resource (xiv, 472 pages) : illustrations.
Series: Lecture notes in computer science ; 9614.
LNCS sublibrary. Security and cryptology.
Subjects:
Table of Contents:
  • Trading Plaintext-Awareness for Simulatability to Achieve Chosen Cipher Text Security
  • Chosen-Cipher Text Security from Subset Sum
  • mso-fareast-theme-font: minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:CMR10; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:AR-SA">On the Hardness of Proving CCA-Security of Signed ElGamal
  • CA-Secure Keyed-Fully Homomorphic Encryption
  • On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions
  • Extended Nested Dual System Groups, Revisited
  • Functional Encryption for Inner Product with Full Function Privacy
  • Deniable Functional Encryption
  • Identity-Based Cryptosystems and Quadratic Residuosity
  • Identity-based Hierarchical Key-insulated Encryption without Random Oracles
  • Attribute-Based Signatures for Circuits from Bilinear Map
  • Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys
  • Fault-Tolerant Aggregate Signatures
  • Delegatable Functional Signatures
  • Mitigating Multi-Target Attacks in Hash-based Signatures
  • Nearly Optimal Verifiable Data Streaming
  • ARMed SPHINCS Computing a 41 KB signature in 16 KB of RAM.