Limit search to available items
Book Cover
E-book
Author International Workshop on Practice and Theory in Public Key Cryptography (15th : 2012 : Darmstadt, Germany)

Title Public key cryptography-- PKC 2012 : 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings / edited by Marc Fischlin, Johannes Buchmann, Mark Manulis
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource (xiv, 734 pages)
Series Lecture notes in computer science, 0302-9743 ; 7293
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7293.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Better Bootstrapping in Fully Homomorphic Encryption / Craig Gentry, Shai Halevi and Nigel P. Smart -- Polly Cracker, Revisited, Revisited / Gottfried Herold -- Ring-LWE in Polynomial Rings / Léo Ducas and Alain Durmus -- On Homomorphic Encryption and Chosen-Ciphertext Security / Brett Hemenway and Rafail Ostrovsky -- Waters Signatures with Optimal Security Reduction / Dennis Hofheinz, Tibor Jager and Edward Knapp -- Strong Security from Probabilistic Signature Schemes / Sven Schäge -- Space Efficient Signature Schemes from the RSA Assumption / Shota Yamada, Goichiro Hanaoka and Noboru Kunihiro -- The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles / Qiong Huang, Duncan S. Wong and Willy Susilo -- Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes / Pierre-Louis Cayrel, Gerhard Hoffmann and Edoardo Persichetti
Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited / Enrico Thomae and Christopher Wolf -- Public-Key Identification Schemes Based on Multivariate Cubic Polynomials / Koichi Sakumoto -- Public-Key Cryptography from New Multivariate Quadratic Assumptions / Yun-Ju Huang, Feng-Hao Liu and Bo-Yin Yang -- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model / Benoît Libert, Kenneth G. Paterson and Elizabeth A. Quaglia -- Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts / Nelly Fazio and Irippuge Milinda Perera -- Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication / Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C.N. Schuldt and Goichiro Hanaoka, et al. -- Public Key Encryption against Related Key Attacks / Hoeteck Wee -- Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices / Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris and Hoeteck Wee
Variants of Waters' Dual System Primitives Using Asymmetric Pairings / (Extended Abstract) / Somindu C. Ramanna, Sanjit Chatterjee and Palash Sarkar -- From Selective to Full Security: Semi-generic Transformations in the Standard Model / Michel Abdalla, Dario Fiore and Vadim Lyubashevsky -- Circular and KDM Security for Identity-Based Encryption / Jacob Alperin-Sheriff and Chris Peikert -- NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model / Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary and Huaxiong Wang -- Generating Provable Primes Efficiently on Embedded Devices / Christophe Clavier, Benoit Feix, Loïc Thierry and Pascal Paillier -- Password-Based Authenticated Key Exchange / David Pointcheval -- Constant-Round Multi-party Private Set Union Using Reversed Laurent Series / Jae Hong Seo, Jung Hee Cheon and Jonathan Katz -- Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies / Emil Stefanov, Elaine Shi and Dawn Song
Efficiently Shuffling in Public / Udaya Parampalli, Kim Ramchen and Vanessa Teague -- Efficient Password Authenticated Key Exchange via Oblivious Transfer / Ran Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan and Hoeteck Wee -- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices / Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa and Kazuki Yoneyama -- Relatively-Sound NIZKs and Password-Based Key-Exchange / Charanjit Jutla and Arnab Roy -- Multi-location Leakage Resilient Cryptography / Ali Juma, Yevgeniy Vahlis and Moti Yung -- On Definitions of Selective Opening Security / Florian Böhl, Dennis Hofheinz and Daniel Kraschewski -- New Definitions and Separations for Circular Security / David Cash, Matthew Green and Susan Hohenberger -- Correlated Product Security from Any One-Way Function / Brett Hemenway, Steve Lu and Rafail Ostrovsky -- Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms / Takahiro Matsuda, Goichiro Hanaoka and Kanta Matsuura
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve / Yumi Sakemi, Goichiro Hanaoka, Tetsuya Izu, Masahiko Takenaka and Masaya Yasuda -- Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods / Aurélie Bauer, Damien Vergnaud and Jean-Christophe Zapalowicz -- Extended-DDH and Lossy Trapdoor Functions / Brett Hemenway and Rafail Ostrovsky -- DDH-Like Assumptions Based on Extension Rings / Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias and Angela Zottarel -- Security of Blind Signatures Revisited / Dominique Schröder and Dominique Unruh -- Efficient Network Coding Signatures in the Standard Model / Dario Catalano, Dario Fiore and Bogdan Warinschi -- Improved Security for Linearly Homomorphic Signatures: A Generic Framework / David Mandell Freeman -- On the Security of Dynamic Group Signatures: Preventing Signature Hijacking / Yusuke Sakai, Jacob C.N. Schuldt, Keita Emura, Goichiro Hanaoka and Kazuo Ohta
Summary Annotation This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes
Analysis Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Computer software
Computational complexity
Information Systems
Algorithm Analysis and Problem Complexity
Systems and Data Security
Discrete Mathematics in Computer Science
Bibliography Includes bibliographical references and author index
Subject Public key cryptography -- Congresses
Data encryption (Computer science) -- Congresses
Informatique.
Data encryption (Computer science)
Public key cryptography
Genre/Form Conference papers and proceedings
Software.
Form Electronic book
Author Fischlin, Marc.
Buchmann, Johannes.
Manulis, Mark.
ISBN 9783642300578
364230057X
Other Titles PKC 2012