Description |
1 online resource |
Series |
Lecture notes in computer science, 0302-9743 ; 7778 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7778.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Homomorphic Encryption -- Packed Ciphertexts in LWE-Based Homomorphic Encryption / Zvika Brakerski, Craig Gentry, Shai Halevi -- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption / Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou -- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption / Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda, Shota Yamada -- Invited Talk (1) -- Functional Encryption: Origins and Recent Developments / Brent Waters -- Primitives -- Vector Commitments and Their Applications / Dario Catalano, Dario Fiore -- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS / Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou -- Cryptography Using Captcha Puzzles / Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia |
|
Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications / San Ling, Khoa Nguyen, Damien Stehlé, Huaxiong Wang -- Functional Encryption/Signatures -- Decentralized Attribute-Based Signatures / Tatsuaki Okamoto, Katsuyuki Takashima -- On the Semantic Security of Functional Encryption Schemes / Manuel Barbosa, Pooya Farshim -- Attribute-Based Encryption with Fast Decryption / Susan Hohenberger, Brent Waters -- On RSA -- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors / Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu -- Combined Attack on CRT-RSA / Guillaume Barbu, Alberto Battistello, Guillaume Dabosville, Christophe Giraud -- IBE and IPE -- Revocable Identity-Based Encryption Revisited: Security Model and Construction / Jae Hong Seo, Keita Emura -- Improved (Hierarchical) Inner-Product Encryption from Lattices / Keita Xagawa -- Invited Talk (2) |
|
Techniques for Efficient Secure Computation Based on Yao's Protocol / Yehuda Lindell -- Key Exchange -- Non-Interactive Key Exchange / Eduarda S.V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson -- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages / Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval -- Signature Schemes I -- Tighter Reductions for Forward-Secure Signature Schemes / Michel Abdalla, Fabrice Ben Hamouda, David Pointcheval -- Tagged One-Time Signatures: Tight Security and Optimal Tag Size / Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited / Takahiro Matsuda, Goichiro Hanaoka -- Robust Encryption, Revisited / Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia -- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited / Zhengan Huang, Shengli Liu, Baodong Qin |
|
Signature Schemes II -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures / Nuttapong Attrapadung, Benoît Libert, Thomas Peters -- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES / Ryo Nishimaki, Keita Xagawa -- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies / Kwangsu Lee, Dong Hoon Lee, Moti Yung -- New Constructions and Applications of Trapdoor DDH Groups / Yannick Seurin -- Protocols -- Rate-Limited Secure Function Evaluation: Definitions and Constructions / Özgür Dagdelen, Payman Mohassel, Daniele Venturi -- Verifiable Elections That Scale for Free / Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn -- On the Connection between Leakage Tolerance and Adaptive Security / Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel |
Summary |
This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols |
Analysis |
Computer science |
|
Data protection |
|
Data encryption (Computer science) |
|
Coding theory |
|
Information systems |
|
Systems and Data Security |
|
Coding and Information Theory |
|
Computer Appl. in Administrative Data Processing |
|
computerwetenschappen |
|
computer sciences |
|
informatietheorie |
|
information theory |
|
elektronische handel |
|
electronic commerce |
|
gegevensverwerking |
|
data processing |
|
computertechnieken |
|
computer techniques |
|
gegevensbeheer |
|
data management |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Notes |
International conference proceedings |
|
Includes author index |
Bibliography |
With bibliographical references and index |
Notes |
English |
Subject |
Public key infrastructure (Computer security) -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer security.
|
|
Computer Security
|
|
Government
|
|
governments (administrative bodies)
|
|
Computer security
|
|
Data encryption (Computer science)
|
|
Public key infrastructure (Computer security)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Kurosawa, Kaoru.
|
|
Hanaoka, Goichiro.
|
ISBN |
9783642363627 |
|
3642363628 |
|
364236361X |
|
9783642363610 |
|