Public-key cryptography -- PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings. Part I /
The two-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March 2016. The 34 revised papers presented were carefully reviewed and selected from 143 s...
Corporate Authors: | International Workshop on Practice and Theory in Public Key Cryptography Taipei, Taiwan) |
---|---|
Other Authors: | International Workshop on Practice and Theory in Public Key Cryptography, Cheng, Chen-Mou (Computer scientist), Chung, Kai-Min,, Persiano, Giuseppe,, Yang, Bo-Yin,, SpringerLink (Online service) |
Format: | eBook |
Language: | English |
Published: |
Berlin :
Springer,
2016.
|
Physical Description: |
1 online resource (xiv, 472 pages) : illustrations. |
Series: |
Lecture notes in computer science ;
9614. LNCS sublibrary. Security and cryptology. |
Subjects: |
Table of Contents:
- Trading Plaintext-Awareness for Simulatability to Achieve Chosen Cipher Text Security
- Chosen-Cipher Text Security from Subset Sum
- mso-fareast-theme-font: minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:CMR10; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:AR-SA">On the Hardness of Proving CCA-Security of Signed ElGamal
- CA-Secure Keyed-Fully Homomorphic Encryption
- On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions
- Extended Nested Dual System Groups, Revisited
- Functional Encryption for Inner Product with Full Function Privacy
- Deniable Functional Encryption
- Identity-Based Cryptosystems and Quadratic Residuosity
- Identity-based Hierarchical Key-insulated Encryption without Random Oracles
- Attribute-Based Signatures for Circuits from Bilinear Map
- Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys
- Fault-Tolerant Aggregate Signatures
- Delegatable Functional Signatures
- Mitigating Multi-Target Attacks in Hash-based Signatures
- Nearly Optimal Verifiable Data Streaming
- ARMed SPHINCS Computing a 41 KB signature in 16 KB of RAM.