skip to content
Public key cryptography - PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary 26 - March 1, 2013 ; proceedings Preview this item
ClosePreview this item
Checking...

Public key cryptography - PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary 26 - March 1, 2013 ; proceedings

Author: Kaoru Kurosawa
Publisher: Berlin [u.a.] : Springer, 2013.
Series: Lecture Notes in Computer Science, 7778.
Edition/Format:   Print book : EnglishView all editions and formats
Database:WorldCat
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Kongress
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Kaoru Kurosawa
ISBN: 364236361X 9783642363610 9783642363627 3642363628
OCLC Number: 835425600
Description: XIV, 518 S. : graph. Darst. ; 796 g.
Contents: Packed Ciphertexts in LWE-Based Homomorphic Encryption.- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao's Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size.- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions.- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security. Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao's Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size.- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions.- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security.
Series Title: Lecture Notes in Computer Science, 7778.
Other Titles: Public-key cryptography - PKC 2013
Responsibility: Kaoru Kurosawa ... (eds.).
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(1)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/835425600> # Public key cryptography - PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary 26 - March 1, 2013 ; proceedings
    a schema:CreativeWork, schema:Book ;
    library:oclcnum "835425600" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1157202421#Place/berlin_u_a> ; # Berlin u.a.
    schema:about <http://experiment.worldcat.org/entity/work/data/1157202421#Topic/public_key_kryptosystem> ; # Public-Key-Kryptosystem
    schema:about <http://dewey.info/class/005.82/e22/ger/> ;
    schema:alternateName "Public-key cryptography - PKC 2013" ;
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://viaf.org/viaf/66000211> ; # Kaoru Kurosawa
    schema:creator <http://experiment.worldcat.org/entity/work/data/1157202421#Meeting/pkc_16_2013_nara> ; # PKC (16 : 2013 : Nara)
    schema:datePublished "2013" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1157202421> ;
    schema:genre "Kongress" ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1157202421#Series/lecture_notes_in_computer_science> ; # Lecture Notes in Computer Science ;
    schema:name "Public key cryptography - PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary 26 - March 1, 2013 ; proceedings" ;
    schema:productID "835425600" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/835425600#PublicationEvent/berlin_u_a_springer_2013> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1157202421#Agent/springer> ; # Springer
    schema:workExample <http://worldcat.org/isbn/9783642363627> ;
    schema:workExample <http://worldcat.org/isbn/9783642363610> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/835425600> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1157202421#Series/lecture_notes_in_computer_science> # Lecture Notes in Computer Science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/835425600> ; # Public key cryptography - PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary 26 - March 1, 2013 ; proceedings
    schema:name "Lecture Notes in Computer Science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/1157202421#Topic/public_key_kryptosystem> # Public-Key-Kryptosystem
    a schema:Intangible ;
    schema:name "Public-Key-Kryptosystem" ;
    .

<http://viaf.org/viaf/66000211> # Kaoru Kurosawa
    a schema:Person ;
    schema:familyName "Kurosawa" ;
    schema:givenName "Kaoru" ;
    schema:name "Kaoru Kurosawa" ;
    schema:sameAs <http://d-nb.info/gnd/133874583> ;
    .

<http://worldcat.org/isbn/9783642363610>
    a schema:ProductModel ;
    schema:isbn "364236361X" ;
    schema:isbn "9783642363610" ;
    .

<http://worldcat.org/isbn/9783642363627>
    a schema:ProductModel ;
    schema:isbn "3642363628" ;
    schema:isbn "9783642363627" ;
    .

<http://www.worldcat.org/title/-/oclc/835425600>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/835425600> ; # Public key cryptography - PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary 26 - March 1, 2013 ; proceedings
    schema:dateModified "2015-12-15" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.