skip to content
Public key cryptography - PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary 26 - March 1, 2013 ; proceedings Preview this item
ClosePreview this item
Checking...

Public key cryptography - PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary 26 - March 1, 2013 ; proceedings

Author: Kaoru Kurosawa
Publisher: Berlin [u.a.] : Springer, 2013.
Series: Lecture Notes in Computer Science, 7778.
Edition/Format:   Print book : EnglishView all editions and formats
Database:WorldCat
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Kongress
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Kaoru Kurosawa
ISBN: 364236361X 9783642363610 9783642363627 3642363628
OCLC Number: 835425600
Description: XIV, 518 S. : graph. Darst. ; 796 g.
Contents: Packed Ciphertexts in LWE-Based Homomorphic Encryption.- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao's Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size.- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions.- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security. Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao's Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size.- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions.- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security.
Series Title: Lecture Notes in Computer Science, 7778.
Other Titles: Public-key cryptography - PKC 2013
Responsibility: Kaoru Kurosawa ... (eds.).
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(1)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/835425600> # Public key cryptography - PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary 26 - March 1, 2013 ; proceedings
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "835425600" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1209957887#Place/berlin_u_a> ; # Berlin u.a.
   schema:about <http://experiment.worldcat.org/entity/work/data/1209957887#Topic/public_key_kryptosystem> ; # Public-Key-Kryptosystem
   schema:about <http://dewey.info/class/005.82/e22/ger/> ;
   schema:alternateName "Public-key cryptography - PKC 2013" ;
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://viaf.org/viaf/66000211> ; # Kaoru Kurosawa
   schema:creator <http://experiment.worldcat.org/entity/work/data/1209957887#Meeting/pkc_16_2013_nara> ; # PKC (16 : 2013 : Nara)
   schema:datePublished "2013" ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1209957887> ;
   schema:genre "Kongress" ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1209957887#Series/lecture_notes_in_computer_science> ; # Lecture Notes in Computer Science ;
   schema:name "Public key cryptography - PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary 26 - March 1, 2013 ; proceedings" ;
   schema:productID "835425600" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/835425600#PublicationEvent/berlin_u_a_springer_2013> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/1209957887#Agent/springer> ; # Springer
   schema:workExample <http://worldcat.org/isbn/9783642363627> ;
   schema:workExample <http://worldcat.org/isbn/9783642363610> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/835425600> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1209957887#Series/lecture_notes_in_computer_science> # Lecture Notes in Computer Science ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/835425600> ; # Public key cryptography - PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary 26 - March 1, 2013 ; proceedings
   schema:name "Lecture Notes in Computer Science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/1209957887#Topic/public_key_kryptosystem> # Public-Key-Kryptosystem
    a schema:Intangible ;
   schema:name "Public-Key-Kryptosystem" ;
    .

<http://viaf.org/viaf/66000211> # Kaoru Kurosawa
    a schema:Person ;
   schema:familyName "Kurosawa" ;
   schema:givenName "Kaoru" ;
   schema:name "Kaoru Kurosawa" ;
   schema:sameAs <http://d-nb.info/gnd/133874583> ;
    .

<http://worldcat.org/isbn/9783642363610>
    a schema:ProductModel ;
   schema:isbn "364236361X" ;
   schema:isbn "9783642363610" ;
    .

<http://worldcat.org/isbn/9783642363627>
    a schema:ProductModel ;
   schema:isbn "3642363628" ;
   schema:isbn "9783642363627" ;
    .

<http://www.worldcat.org/title/-/oclc/835425600>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/835425600> ; # Public key cryptography - PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary 26 - March 1, 2013 ; proceedings
   schema:dateModified "2017-01-21" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.