Description |
1 online resource (xvii, 614 pages) : illustrations (some color) |
Series |
Lecture notes in computer science ; 11442 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 11442.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
[I]. Cryptographic protocols: 1. Sub-logarithmic distributed oblivious RAM with small block size / Eyal Kushilevitz and Tamer Mour -- 2. Lossy algebraic filters with short tags / Benoît Libert and Chen Qian -- 3. Non-interactive keyed-verification anonymous credentials / Geoffroy Couteau and Michael Reichle |
|
[II]. Digital signatures: 4. Shorter ring signatures from standard assumptions / Alonso González -- 5. Efficient attribute-based signatures for unbounded arithmetic branching programs / Pratish Datta, Tatsuaki Okamoto, and Katsuyuki Takashima -- 6. Efficient invisible and unlinkable sanitizable signatures / Xavier Bultel, Pascal Lafourcade, Russell W.F. Lai, Giulio Malavolta, Dominique Schröder, and Sri Aravinda Krishnan Thyagarajan -- 7. Group signatures with selective linkability / Lydia Garms and Anja Lehmann -- 8. Let a non-barking watchdog bite : cliptographic signatures with an offline watchdog / Sherman S.M. Chow, Alexander Russell, Qiang Tang, Moti Yung, Yongjun Zhao, and Hong-Sheng Zhou |
|
[III]. Zero-knowledge: 9. Zero-knowledge elementary databases with more expressive queries / Benoît Libert, Khoa Nguyen, Benjamin Hong Meng Tan, and Huaxiong Wang -- 10. Efficient non-interactive zero-knowledge proofs in cross-domains without trusted setup / Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, and Ivan Pryvalov -- 11. Shorter quadratic QA-NIZK proofs / Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols, and Javier Silva -- 12. Short discrete log proofs for FHE and ring-LWE ciphertexts / Rafael del Pino, Vadim Lyubashevsky, and Gregor Seiler -- 13. Publicly verifiable proofs from blockchains / Alessandra Scafuro, Luisa Siniscalchi, and Ivan Visconti |
|
[IV]. Identity-based encryption: 14. Identity-based broadcast encryption with efficient revocation / Aijun Ge and Puwen Wei -- 15. Tightly secure hierarchical identity-based encryption / Roman Langrehr and Jiaxin Pan -- 16. Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio / Ryo Nishimaki and Takashi Yamakawa -- 17. Additively homomorphic IBE from higher residuosity / Michael Clear and Ciaran McGoldrick |
|
[V]. Fundamental primitives (I): 18. Upper and lower bounds for continuous non-malleable codes / Dana Dachman-Soled and Mukul Kulkarni -- 19. Improved security evaluation techniques for imperfect randomness from arbitrary distributions / Takahiro Matsuda, Kenta Takahashi, Takao Murakami, and Goichiro Hanaoka -- 20. On tightly secure primitives in the multi-instance setting / Dennis Hofheinz and Ngoc Khanh Nguyen |
Summary |
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented [20 in part I] were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography. -- Provided by publisher |
Notes |
International conference proceedings |
|
Includes author index |
|
Online resource; title from PDF title page (SpringerLink, viewed April 11, 2019) |
Subject |
Public key cryptography -- Congresses
|
|
Public key cryptography
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Lin, Dongdai, editor.
|
|
Sako, Kazue (Innovation Producer), editor.
|
ISBN |
9783030172534 |
|
3030172538 |
|