Limit search to available items
Book Cover
E-book
Author International Workshop on Practice and Theory in Public Key Cryptography (16th : 2013 : Nara-shi, Japan)

Title Public-key cryptography-- PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26-March 1, 2013. Proceedings / Kaoru Kurosawa, Goichiro Hanaoka (eds.)
Published Berlin ; New York : Springer, ©2013

Copies

Description 1 online resource
Series Lecture notes in computer science, 0302-9743 ; 7778
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7778.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Homomorphic Encryption -- Packed Ciphertexts in LWE-Based Homomorphic Encryption / Zvika Brakerski, Craig Gentry, Shai Halevi -- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption / Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou -- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption / Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda, Shota Yamada -- Invited Talk (1) -- Functional Encryption: Origins and Recent Developments / Brent Waters -- Primitives -- Vector Commitments and Their Applications / Dario Catalano, Dario Fiore -- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS / Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou -- Cryptography Using Captcha Puzzles / Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia
Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications / San Ling, Khoa Nguyen, Damien Stehlé, Huaxiong Wang -- Functional Encryption/Signatures -- Decentralized Attribute-Based Signatures / Tatsuaki Okamoto, Katsuyuki Takashima -- On the Semantic Security of Functional Encryption Schemes / Manuel Barbosa, Pooya Farshim -- Attribute-Based Encryption with Fast Decryption / Susan Hohenberger, Brent Waters -- On RSA -- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors / Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu -- Combined Attack on CRT-RSA / Guillaume Barbu, Alberto Battistello, Guillaume Dabosville, Christophe Giraud -- IBE and IPE -- Revocable Identity-Based Encryption Revisited: Security Model and Construction / Jae Hong Seo, Keita Emura -- Improved (Hierarchical) Inner-Product Encryption from Lattices / Keita Xagawa -- Invited Talk (2)
Techniques for Efficient Secure Computation Based on Yao's Protocol / Yehuda Lindell -- Key Exchange -- Non-Interactive Key Exchange / Eduarda S.V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson -- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages / Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval -- Signature Schemes I -- Tighter Reductions for Forward-Secure Signature Schemes / Michel Abdalla, Fabrice Ben Hamouda, David Pointcheval -- Tagged One-Time Signatures: Tight Security and Optimal Tag Size / Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited / Takahiro Matsuda, Goichiro Hanaoka -- Robust Encryption, Revisited / Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia -- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited / Zhengan Huang, Shengli Liu, Baodong Qin
Signature Schemes II -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures / Nuttapong Attrapadung, Benoît Libert, Thomas Peters -- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES / Ryo Nishimaki, Keita Xagawa -- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies / Kwangsu Lee, Dong Hoon Lee, Moti Yung -- New Constructions and Applications of Trapdoor DDH Groups / Yannick Seurin -- Protocols -- Rate-Limited Secure Function Evaluation: Definitions and Constructions / Özgür Dagdelen, Payman Mohassel, Daniele Venturi -- Verifiable Elections That Scale for Free / Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn -- On the Connection between Leakage Tolerance and Adaptive Security / Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel
Summary This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols
Analysis Computer science
Data protection
Data encryption (Computer science)
Coding theory
Information systems
Systems and Data Security
Coding and Information Theory
Computer Appl. in Administrative Data Processing
computerwetenschappen
computer sciences
informatietheorie
information theory
elektronische handel
electronic commerce
gegevensverwerking
data processing
computertechnieken
computer techniques
gegevensbeheer
data management
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Notes International conference proceedings
Includes author index
Bibliography With bibliographical references and index
Notes English
Subject Public key infrastructure (Computer security) -- Congresses
Data encryption (Computer science) -- Congresses
Computer security.
Computer Security
Government
governments (administrative bodies)
Computer security
Data encryption (Computer science)
Public key infrastructure (Computer security)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Kurosawa, Kaoru.
Hanaoka, Goichiro.
ISBN 9783642363627
3642363628
364236361X
9783642363610
Other Titles PKC 2013