skip to content
Public-key cryptography - PKC 2013 : 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26 - March 1, 2013 : proceedings Preview this item
ClosePreview this item

Public-key cryptography - PKC 2013 : 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26 - March 1, 2013 : proceedings

Author: Kaoru Kurosawa
Publisher: Heidelberg : Springer, 2013.
Series: Lecture notes in computer science, 7778.
Edition/Format:   Print book : Conference publication : EnglishView all editions and formats
Summary:

This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013.

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Kongress
congrès
Material Type: Conference publication, Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Kaoru Kurosawa
ISBN: 9783642363610 364236361X 9783642363627 3642363628
OCLC Number: 842344661
Notes: Variante du titre: PKC 2013.
Description: 518 Seiten : Illustrationen.
Contents: Packed Ciphertexts in LWE-Based Homomorphic Encryption.- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao's Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size.- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions.- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security.Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao's Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size.- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions.- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security.
Series Title: Lecture notes in computer science, 7778.
Other Titles: Practice and theory in public-key cryptography
PKC 2013
Responsibility: Kaoru Kurosawa [und weitere], (eds.).
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/842344661> # Public-key cryptography - PKC 2013 : 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26 - March 1, 2013 : proceedings
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "842344661" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1209957887#Place/heidelberg> ; # Heidelberg
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/1209957887#Topic/public_key_kryptosystem> ; # Public-Key-Kryptosystem
   schema:about <http://experiment.worldcat.org/entity/work/data/1209957887#Thing/data_security_+_data_protection_operating_systems> ; # DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)
   schema:about <http://experiment.worldcat.org/entity/work/data/1209957887#Thing/offentliche_verschlusselungssysteme_kryptographie> ; # ÖFFENTLICHE VERSCHLÜSSELUNGSSYSTEME (KRYPTOGRAPHIE)
   schema:about <http://experiment.worldcat.org/entity/work/data/1209957887#Thing/cryptography_information_theory> ; # CRYPTOGRAPHY (INFORMATION THEORY)
   schema:about <http://experiment.worldcat.org/entity/work/data/1209957887#Thing/cryptosystemes_a_cle_publique_cryptographie> ; # CRYPTOSYSTÈMES À CLÉ PUBLIQUE (CRYPTOGRAPHIE)
   schema:about <http://experiment.worldcat.org/entity/work/data/1209957887#Thing/public_key_cryptosystems_cryptography> ; # PUBLIC-KEY CRYPTOSYSTEMS (CRYPTOGRAPHY)
   schema:about <http://experiment.worldcat.org/entity/work/data/1209957887#Topic/cryptographie_a_cle_publique> ; # cryptographie à clé publique
   schema:about <http://experiment.worldcat.org/entity/work/data/1209957887#Thing/kryptographie_informationstheorie> ; # KRYPTOGRAPHIE (INFORMATIONSTHEORIE)
   schema:about <http://experiment.worldcat.org/entity/work/data/1209957887#Thing/cryptographie_theorie_de_l_information> ; # CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)
   schema:about <http://experiment.worldcat.org/entity/work/data/1209957887#Thing/datensicherheit_+_datenschutz_betriebssysteme> ; # DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)
   schema:about <http://experiment.worldcat.org/entity/work/data/1209957887#Thing/securite_et_protection_des_donnees_systemes_d_exploitation> ; # SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)
   schema:about <http://dewey.info/class/005.82/e22/ger/> ;
   schema:alternateName "Practice and theory in public-key cryptography" ;
   schema:alternateName "PKC 2013" ;
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://viaf.org/viaf/66000211> ; # Kaoru Kurosawa
   schema:contributor <http://experiment.worldcat.org/entity/work/data/1209957887#Meeting/international_workshop_on_practice_and_theory_in_public_key_cryptosystems_16_2013_nara> ; # International Workshop on Practice and Theory in Public Key Cryptosystems (16 : 2013 : Nara)
   schema:datePublished "2013" ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1209957887> ;
   schema:genre "Conference publication"@en ;
   schema:genre "Kongress" ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1209957887#Series/security_and_cryptology_sublibrary_of_lecture_notes_in_computer_science> ; # Security and cryptology. Sublibrary of Lecture notes in computer science ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1209957887#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
   schema:name "Public-key cryptography - PKC 2013 : 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26 - March 1, 2013 : proceedings" ;
   schema:productID "842344661" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/842344661#PublicationEvent/heidelberg_springer_2013> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/1209957887#Agent/springer> ; # Springer
   schema:url <http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025788897&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA> ;
   schema:url <http://bvbr.bib-bvb.de:8991/F?func=serviceetdoc_library=BVB01etdoc_number=025788897etline_number=0001etfunc_code=DB_RECORDSetservice_type=MEDIA> ;
   schema:workExample <http://worldcat.org/isbn/9783642363627> ;
   schema:workExample <http://worldcat.org/isbn/9783642363610> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/842344661> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1209957887#Meeting/international_workshop_on_practice_and_theory_in_public_key_cryptosystems_16_2013_nara> # International Workshop on Practice and Theory in Public Key Cryptosystems (16 : 2013 : Nara)
    a bgn:Meeting, schema:Event ;
   schema:location <http://experiment.worldcat.org/entity/work/data/1209957887#Place/nara> ; # Nara)
   schema:name "International Workshop on Practice and Theory in Public Key Cryptosystems (16 : 2013 : Nara)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1209957887#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/842344661> ; # Public-key cryptography - PKC 2013 : 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26 - March 1, 2013 : proceedings
   schema:name "Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/1209957887#Series/security_and_cryptology_sublibrary_of_lecture_notes_in_computer_science> # Security and cryptology. Sublibrary of Lecture notes in computer science ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/842344661> ; # Public-key cryptography - PKC 2013 : 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26 - March 1, 2013 : proceedings
   schema:name "Security and cryptology. Sublibrary of Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/1209957887#Thing/cryptographie_theorie_de_l_information> # CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)
    a schema:Thing ;
   schema:name "CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1209957887#Thing/cryptography_information_theory> # CRYPTOGRAPHY (INFORMATION THEORY)
    a schema:Thing ;
   schema:name "CRYPTOGRAPHY (INFORMATION THEORY)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1209957887#Thing/cryptosystemes_a_cle_publique_cryptographie> # CRYPTOSYSTÈMES À CLÉ PUBLIQUE (CRYPTOGRAPHIE)
    a schema:Thing ;
   schema:name "CRYPTOSYSTÈMES À CLÉ PUBLIQUE (CRYPTOGRAPHIE)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1209957887#Thing/data_security_+_data_protection_operating_systems> # DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)
    a schema:Thing ;
   schema:name "DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1209957887#Thing/datensicherheit_+_datenschutz_betriebssysteme> # DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)
    a schema:Thing ;
   schema:name "DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1209957887#Thing/kryptographie_informationstheorie> # KRYPTOGRAPHIE (INFORMATIONSTHEORIE)
    a schema:Thing ;
   schema:name "KRYPTOGRAPHIE (INFORMATIONSTHEORIE)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1209957887#Thing/offentliche_verschlusselungssysteme_kryptographie> # ÖFFENTLICHE VERSCHLÜSSELUNGSSYSTEME (KRYPTOGRAPHIE)
    a schema:Thing ;
   schema:name "ÖFFENTLICHE VERSCHLÜSSELUNGSSYSTEME (KRYPTOGRAPHIE)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1209957887#Thing/public_key_cryptosystems_cryptography> # PUBLIC-KEY CRYPTOSYSTEMS (CRYPTOGRAPHY)
    a schema:Thing ;
   schema:name "PUBLIC-KEY CRYPTOSYSTEMS (CRYPTOGRAPHY)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1209957887#Thing/securite_et_protection_des_donnees_systemes_d_exploitation> # SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)
    a schema:Thing ;
   schema:name "SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1209957887#Topic/cryptographie_a_cle_publique> # cryptographie à clé publique
    a schema:Intangible ;
   schema:name "cryptographie à clé publique" ;
    .

<http://experiment.worldcat.org/entity/work/data/1209957887#Topic/public_key_kryptosystem> # Public-Key-Kryptosystem
    a schema:Intangible ;
   schema:name "Public-Key-Kryptosystem" ;
    .

<http://viaf.org/viaf/66000211> # Kaoru Kurosawa
    a schema:Person ;
   schema:familyName "Kurosawa" ;
   schema:givenName "Kaoru" ;
   schema:name "Kaoru Kurosawa" ;
    .

<http://worldcat.org/isbn/9783642363610>
    a schema:ProductModel ;
   schema:isbn "364236361X" ;
   schema:isbn "9783642363610" ;
    .

<http://worldcat.org/isbn/9783642363627>
    a schema:ProductModel ;
   schema:isbn "3642363628" ;
   schema:isbn "9783642363627" ;
    .

<http://www.worldcat.org/title/-/oclc/842344661>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/842344661> ; # Public-key cryptography - PKC 2013 : 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26 - March 1, 2013 : proceedings
   schema:dateModified "2018-03-12" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.