Public Key Cryptography PKC 2014 17th International Conference on Practice and Theory in Public Key Cryptography Buenos Aires Argentina March 26 28 2014 Proceedings 1st Edition by Hugo Krawczyk- Ebook PDF Instant Download/Delivery: 9783642546303, 3642546307
Full download Public Key Cryptography PKC 2014 17th International Conference on Practice and Theory in Public Key Cryptography Buenos Aires Argentina March 26 28 2014 Proceedings 1st Edition after payment
Product details:
ISBN 10: 3642546307
ISBN 13: 9783642546303
Author: Hugo Krawczyk
This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.
Table of contents:
-
Simple Chosen-Ciphertext Security from Low-Noise LPN
-
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
-
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme
-
Chosen Ciphertext Security via UCE
-
Proxy Re-encryption from Lattices
-
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices
-
Verifiable Set Operations over Outsourced Databases
-
Verifiable Oblivious Storage
-
Achieving Privacy in Verifiable Computation with Multiple Servers – Without FHE and without Pre-processing
-
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting
-
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
-
Elliptic and Hyperelliptic Curves: A Practical Security Analysis
-
Discrete Logarithm in GF(2809) with FFS
-
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications
-
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
-
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
-
Online/Offline Attribute-Based Encryption
-
Scale-Invariant Fully Homomorphic Encryption over the Integers
-
Enhanced Chosen-Ciphertext Security and Applications
-
Lattice-Based Group Signature Scheme with Verifier-Local Revocation
-
Leakage-Resilient Signatures with Graceful Degradation
-
On the Lossiness of the Rabin Trapdoor Function
-
Solving Random Subset Sum Problem by l p -norm SVP Oracle
-
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice
-
Lazy Modulus Switching for the BKW Algorithm on LWE
-
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions
-
Related Randomness Attacks for Public Key Encryption
-
Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks
-
Functional Signatures and Pseudorandom Functions
-
Policy-Based Signatures
-
Generalizing Homomorphic MACs for Arithmetic Circuits
-
General Impossibility of Group Homomorphic Encryption in the Quantum World
-
On Minimal Assumptions for Sender-Deniable Public Key Encryption
-
Traceable Group Encryption
-
Practical Covert Authentication
-
Fine-Tuning Groth-Sahai Proofs
-
Cross-Domain Secure Computation
-
On the Security of the Pre-shared Key Ciphersuites of TLS
People also search for:
principles of public key cryptography
how does public key cryptography work
explain public key cryptography
rsa public key cryptography
private and public key cryptography
Tags: Hugo Krawczyk, Public Key Cryptography, Practice, Theory, Proceedings, International Conference