Description |
1 online resource (xiv, 734 pages) |
Series |
Lecture notes in computer science, 0302-9743 ; 7293 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7293.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Better Bootstrapping in Fully Homomorphic Encryption / Craig Gentry, Shai Halevi and Nigel P. Smart -- Polly Cracker, Revisited, Revisited / Gottfried Herold -- Ring-LWE in Polynomial Rings / Léo Ducas and Alain Durmus -- On Homomorphic Encryption and Chosen-Ciphertext Security / Brett Hemenway and Rafail Ostrovsky -- Waters Signatures with Optimal Security Reduction / Dennis Hofheinz, Tibor Jager and Edward Knapp -- Strong Security from Probabilistic Signature Schemes / Sven Schäge -- Space Efficient Signature Schemes from the RSA Assumption / Shota Yamada, Goichiro Hanaoka and Noboru Kunihiro -- The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles / Qiong Huang, Duncan S. Wong and Willy Susilo -- Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes / Pierre-Louis Cayrel, Gerhard Hoffmann and Edoardo Persichetti |
|
Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited / Enrico Thomae and Christopher Wolf -- Public-Key Identification Schemes Based on Multivariate Cubic Polynomials / Koichi Sakumoto -- Public-Key Cryptography from New Multivariate Quadratic Assumptions / Yun-Ju Huang, Feng-Hao Liu and Bo-Yin Yang -- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model / Benoît Libert, Kenneth G. Paterson and Elizabeth A. Quaglia -- Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts / Nelly Fazio and Irippuge Milinda Perera -- Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication / Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C.N. Schuldt and Goichiro Hanaoka, et al. -- Public Key Encryption against Related Key Attacks / Hoeteck Wee -- Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices / Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris and Hoeteck Wee |
|
Variants of Waters' Dual System Primitives Using Asymmetric Pairings / (Extended Abstract) / Somindu C. Ramanna, Sanjit Chatterjee and Palash Sarkar -- From Selective to Full Security: Semi-generic Transformations in the Standard Model / Michel Abdalla, Dario Fiore and Vadim Lyubashevsky -- Circular and KDM Security for Identity-Based Encryption / Jacob Alperin-Sheriff and Chris Peikert -- NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model / Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary and Huaxiong Wang -- Generating Provable Primes Efficiently on Embedded Devices / Christophe Clavier, Benoit Feix, Loïc Thierry and Pascal Paillier -- Password-Based Authenticated Key Exchange / David Pointcheval -- Constant-Round Multi-party Private Set Union Using Reversed Laurent Series / Jae Hong Seo, Jung Hee Cheon and Jonathan Katz -- Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies / Emil Stefanov, Elaine Shi and Dawn Song |
|
Efficiently Shuffling in Public / Udaya Parampalli, Kim Ramchen and Vanessa Teague -- Efficient Password Authenticated Key Exchange via Oblivious Transfer / Ran Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan and Hoeteck Wee -- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices / Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa and Kazuki Yoneyama -- Relatively-Sound NIZKs and Password-Based Key-Exchange / Charanjit Jutla and Arnab Roy -- Multi-location Leakage Resilient Cryptography / Ali Juma, Yevgeniy Vahlis and Moti Yung -- On Definitions of Selective Opening Security / Florian Böhl, Dennis Hofheinz and Daniel Kraschewski -- New Definitions and Separations for Circular Security / David Cash, Matthew Green and Susan Hohenberger -- Correlated Product Security from Any One-Way Function / Brett Hemenway, Steve Lu and Rafail Ostrovsky -- Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms / Takahiro Matsuda, Goichiro Hanaoka and Kanta Matsuura |
|
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve / Yumi Sakemi, Goichiro Hanaoka, Tetsuya Izu, Masahiko Takenaka and Masaya Yasuda -- Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods / Aurélie Bauer, Damien Vergnaud and Jean-Christophe Zapalowicz -- Extended-DDH and Lossy Trapdoor Functions / Brett Hemenway and Rafail Ostrovsky -- DDH-Like Assumptions Based on Extension Rings / Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias and Angela Zottarel -- Security of Blind Signatures Revisited / Dominique Schröder and Dominique Unruh -- Efficient Network Coding Signatures in the Standard Model / Dario Catalano, Dario Fiore and Bogdan Warinschi -- Improved Security for Linearly Homomorphic Signatures: A Generic Framework / David Mandell Freeman -- On the Security of Dynamic Group Signatures: Preventing Signature Hijacking / Yusuke Sakai, Jacob C.N. Schuldt, Keita Emura, Goichiro Hanaoka and Kazuo Ohta |
Summary |
Annotation This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Data protection |
|
Data encryption (Computer science) |
|
Computer software |
|
Computational complexity |
|
Information Systems |
|
Algorithm Analysis and Problem Complexity |
|
Systems and Data Security |
|
Discrete Mathematics in Computer Science |
Bibliography |
Includes bibliographical references and author index |
Subject |
Public key cryptography -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Informatique.
|
|
Data encryption (Computer science)
|
|
Public key cryptography
|
Genre/Form |
Conference papers and proceedings
|
|
Software.
|
Form |
Electronic book
|
Author |
Fischlin, Marc.
|
|
Buchmann, Johannes.
|
|
Manulis, Mark.
|
ISBN |
9783642300578 |
|
364230057X |
|