Limit search to available items
Book Cover
E-book
Author International Workshop on Practice and Theory in Public Key Cryptography (22nd : 2019 : Beijing, China)

Title Public-key cryptography -- PKC 2019 : 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings. Part II / Dongdai Lin, Kazue Sako (eds.)
Published Cham, Switzerland : Springer, 2019

Copies

Description 1 online resource (xviii, 680 pages) : illustrations (some color)
Series Lecture notes in computer science ; 11443
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 11443.
LNCS sublibrary. SL 4, Security and cryptology.
Contents [I]. Public key encryptions: Collusion resistant broadcast and trace from positional witness encryption / Rishab Goyal, Satyanarayana Vusirikala, Brent Waters -- Break-glass encryption / Alessasndra Scafuro -- Registration-based encryption from standard assumptions / Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, Sruthi Sekar
[II]. Functional encryption: FE for inner products and its application to decentralized ABE / Zhedong Wang, Xiong Fan, Feng-Hao Liu -- Decentralizing inner-product functional encryption / Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner -- Non-zero inner product encryption schemes from various assumptions : LWE, DDH and DCR / Shuichi Katsumata, Shota Yamada -- Function private predicate encryption for low min-entropy predicates / Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna
[III]. Obfuscation based cryptography: Adaptively single-key secure constrained PRFs for NC1 / Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa -- Obfuscating simple functionalities from knowledge assumptions / Ward Beullens, Hoeteck Wee
[IV]. Re-encryption schemes: What about Bob? The inadequacy of CPA security for proxy reencryption / Aloni Cohen -- Adaptively secure proxy re-encryption / Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak
[V]. Fundamental primitives (II): Generic constructions of robustly reusable fuzzy extractor / Yunhua Wen, Shengli Liu, Dawu Gu -- Safety in numbers : on the need for robust Diffie-Hellman parameter validation / Steven Galbraith, Jake Massimo, Kenneth G. Paterson -- Hunting and gathering : verifiable random functions from standard assumptions with short proofs / Lisa Kohl
[VI]. Post quantum cryptography: Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance / Shuichi Katsumata, Takahiro Matsuda, Atsushi Takayasu -- Towards non-interactive zero-knowledge for NP from LWE / Ron D. Rothblum, Adam Sealfon, Katerina Sotiraki -- More efficient algorithms for the NTRU key generation using the field norm / Thomas Pornin, Thomas Prest -- Efficiently masking binomial sampling at arbitrary orders for lattice-based crypto / Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu -- Decryption failure attacks on IND-CCA secure lattice-based schemes / Jan-Pieter D'Anvers, Qian Guo, Thomas Johnasson, Alexander Nilsson, Frederik Vercauteren, Ingrid Verbauwhede -- Reducing the key size of McEliece cryptosystem from automorphism-induced Goppa codes via permutations / Zhe Li, Chaoping Xing, Sze Ling Yeo -- Key encapsulation mechanism with explicit rejection in the quantum random oracle model / Haodong Jiang, Zhenfeng Zhang, Zhi Ma -- Factoring products of braids via Garside normal form / Simon-Philipp Merz, Christophe Petit
Summary The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography. -- Provided by publisher
Notes International conference proceedings
Includes author index
Online resource; title from PDF title page (SpringerLink, viewed April 11, 2019)
Subject Public key cryptography -- Congresses
Public key cryptography
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Lin, Dongdai, editor.
Sako, Kazue (Innovation Producer), editor.
ISBN 9783030172596
3030172597
3030172589
9783030172589
Other Titles PKC 2019