Description |
1 online resource : illustrations |
Series |
Lecture notes in computer science ; 8383. SL 4, Security and cryptology |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 8383. 1611-3349
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Chosen ciphertext security.-Re-encryption -- Verifiable outsourcing -- Cryptanalysis -- Identity- and attribute-based encryption -- Enhanced encryption -- Signature schemes -- Related-key security -- Functional authentication -- Quantum impossibility.-Privacy -- Protocols |
Summary |
This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols |
Bibliography |
Includes bibliographical references and index |
Subject |
Public key infrastructure (Computer security) -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Data encryption (Computer science)
|
|
Public key infrastructure (Computer security)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Krawczyk, Hugo, editor
|
ISBN |
9783642546310 |
|
3642546315 |
|