skip to content
Public key cryptography proceedings Preview this item
ClosePreview this item
Checking...

Public key cryptography proceedings

Author: Kaoru Kurosawa; Goichiro Hanaoka; International Association for Cryptologic Research
Publisher: [Berlin Heidelberg] Springer 2013
Series: Lecture notes in computer science, 7778
Edition/Format:   Print book : Conference publication : EnglishView all editions and formats
Database:WorldCat
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Kongress
Material Type: Conference publication
Document Type: Book
All Authors / Contributors: Kaoru Kurosawa; Goichiro Hanaoka; International Association for Cryptologic Research
ISBN: 9783642363610 364236361X
OCLC Number: 845372488
Notes: Literaturangaben
Description: XIV, 518 S. graph. Darst. 24 cm, 796 g
Contents: Packed Ciphertexts in LWE-Based Homomorphic Encryption.- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao's Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size.- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions.- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security. Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao's Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size.- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions.- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security.
Series Title: Lecture notes in computer science, 7778
Responsibility: PKC 2013, 16th International Conference on Practice and Theory in Public Key Cryptography, Nara, Japan, Feburary 26 - March 1, 2013. Kaoru Kurosawa ; Goichiro Hanaoka (ed.). [IACR, International Association for Cryptologic Research]
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(1)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/845372488> # Public key cryptography proceedings
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "845372488" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1157202421#Place/berlin> ; # Berlin
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1157202421#Place/heidelberg> ; # Heidelberg
   schema:about <http://experiment.worldcat.org/entity/work/data/1157202421#Topic/public_key_kryptosystem> ; # Public-Key-Kryptosystem
   schema:about <http://dewey.info/class/005.82/e22/ger/> ;
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://experiment.worldcat.org/entity/work/data/1157202421#Meeting/pkc_16_2013_nara> ; # PKC 16 2013 Nara
   schema:contributor <http://viaf.org/viaf/141764476> ; # International Association for Cryptologic Research
   schema:datePublished "2013" ;
   schema:editor <http://experiment.worldcat.org/entity/work/data/1157202421#Person/kurosawa_kaoru> ; # Kaoru Kurosawa
   schema:editor <http://viaf.org/viaf/269710193> ; # Goichiro Hanaoka
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1157202421> ;
   schema:genre "Kongress" ;
   schema:genre "Conference publication"@en ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1157202421#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science
   schema:name "Public key cryptography proceedings" ;
   schema:productID "845372488" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/845372488#PublicationEvent/berlinheidelbergspringer2013> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/1157202421#Agent/springer> ; # Springer
   schema:workExample <http://worldcat.org/isbn/9783642363610> ;
   umbel:isLike <http://d-nb.info/1030084068> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/845372488> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1157202421#Series/lecture_notes_in_computer_science> # Lecture notes in computer science
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/845372488> ; # Public key cryptography proceedings
   schema:name "Lecture notes in computer science" ;
    .

<http://experiment.worldcat.org/entity/work/data/1157202421#Topic/public_key_kryptosystem> # Public-Key-Kryptosystem
    a schema:Intangible ;
   schema:name "Public-Key-Kryptosystem" ;
    .

<http://viaf.org/viaf/141764476> # International Association for Cryptologic Research
    a schema:Organization ;
   schema:name "International Association for Cryptologic Research" ;
   schema:sameAs <http://d-nb.info/gnd/2085597-7> ;
    .

<http://viaf.org/viaf/269710193> # Goichiro Hanaoka
    a schema:Person ;
   schema:familyName "Hanaoka" ;
   schema:givenName "Goichiro" ;
   schema:name "Goichiro Hanaoka" ;
   schema:sameAs <http://d-nb.info/gnd/1034949268> ;
    .

<http://worldcat.org/isbn/9783642363610>
    a schema:ProductModel ;
   schema:isbn "364236361X" ;
   schema:isbn "9783642363610" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.