skip to content
Public-key cryptography-- PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26-March 1, 2013. Proceedings Preview this item
ClosePreview this item
Checking...

Public-key cryptography-- PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26-March 1, 2013. Proceedings

Author: Kaoru Kurosawa; Goichiro Hanaoka
Publisher: Berlin ; New York : Springer, ©2013.
Series: Lecture notes in computer science, 7778.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Database:WorldCat
Summary:
This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference proceedings
Congresses
Additional Physical Format: Printed edition:
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Kaoru Kurosawa; Goichiro Hanaoka
ISBN: 9783642363627 3642363628 364236361X 9783642363610
OCLC Number: 828613201
Notes: International conference proceedings.
Includes author index.
Description: 1 online resource.
Contents: Homomorphic Encryption --
Packed Ciphertexts in LWE-Based Homomorphic Encryption / Zvika Brakerski, Craig Gentry, Shai Halevi --
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption / Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou --
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption / Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda, Shota Yamada --
Invited Talk (1) --
Functional Encryption: Origins and Recent Developments / Brent Waters --
Primitives --
Vector Commitments and Their Applications / Dario Catalano, Dario Fiore --
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS / Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou --
Cryptography Using Captcha Puzzles / Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia --
Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications / San Ling, Khoa Nguyen, Damien Stehlé, Huaxiong Wang --
Functional Encryption/Signatures --
Decentralized Attribute-Based Signatures / Tatsuaki Okamoto, Katsuyuki Takashima --
On the Semantic Security of Functional Encryption Schemes / Manuel Barbosa, Pooya Farshim --
Attribute-Based Encryption with Fast Decryption / Susan Hohenberger, Brent Waters --
On RSA --
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors / Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu --
Combined Attack on CRT-RSA / Guillaume Barbu, Alberto Battistello, Guillaume Dabosville, Christophe Giraud --
IBE and IPE --
Revocable Identity-Based Encryption Revisited: Security Model and Construction / Jae Hong Seo, Keita Emura --
Improved (Hierarchical) Inner-Product Encryption from Lattices / Keita Xagawa --
Invited Talk (2) --
Techniques for Efficient Secure Computation Based on Yao's Protocol / Yehuda Lindell --
Key Exchange --
Non-Interactive Key Exchange / Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson --
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages / Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval --
Signature Schemes I --
Tighter Reductions for Forward-Secure Signature Schemes / Michel Abdalla, Fabrice Ben Hamouda, David Pointcheval --
Tagged One-Time Signatures: Tight Security and Optimal Tag Size / Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo --
Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited / Takahiro Matsuda, Goichiro Hanaoka --
Robust Encryption, Revisited / Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia --
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited / Zhengan Huang, Shengli Liu, Baodong Qin --
Signature Schemes II --
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures / Nuttapong Attrapadung, Benoît Libert, Thomas Peters --
Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES / Ryo Nishimaki, Keita Xagawa --
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies / Kwangsu Lee, Dong Hoon Lee, Moti Yung --
New Constructions and Applications of Trapdoor DDH Groups / Yannick Seurin --
Protocols --
Rate-Limited Secure Function Evaluation: Definitions and Constructions / Özgür Dagdelen, Payman Mohassel, Daniele Venturi --
Verifiable Elections That Scale for Free / Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn --
On the Connection between Leakage Tolerance and Adaptive Security / Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel.
Series Title: Lecture notes in computer science, 7778.; LNCS sublibrary., SL 4,, Security and cryptology.
Other Titles: PKC 2013
Responsibility: Kaoru Kurosawa, Goichiro Hanaoka (eds.).
More information:

Abstract:

This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/828613201>
library:oclcnum"828613201"
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
rdf:typeschema:Book
rdf:typeschema:MediaObject
rdf:valueUnknown value: cnp
rdf:valueUnknown value: dct
schema:about
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/1082563>
rdf:typeschema:Intangible
schema:name"Public key infrastructure (Computer security)"
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:alternateName"PKC 2013"
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:copyrightYear"2013"
schema:creator
schema:datePublished"2013"
schema:description"This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols."
schema:exampleOfWork<http://worldcat.org/entity/work/id/1209957887>
schema:genre"Conference proceedings"
schema:genre"Electronic books"
schema:inLanguage"en"
schema:isPartOf
schema:isPartOf
schema:name"Public-key cryptography-- PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26-March 1, 2013. Proceedings"
schema:publication
schema:publisher
schema:url
schema:workExample
schema:workExample
schema:workExample
wdrs:describedby

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.