Ebook: Public Key Cryptography – PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings
Author: Craig Gentry Shai Halevi Nigel P. Smart (auth.) Marc Fischlin Johannes Buchmann Mark Manulis (eds.)
- Tags: Data Encryption, Computer Communication Networks, Management of Computing and Information Systems, Algorithm Analysis and Problem Complexity, Systems and Data Security, Discrete Mathematics in Computer Science
- Series: Lecture Notes in Computer Science 7293
- Year: 2012
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.
This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the folllowing topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.
This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the folllowing topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.
Content:
Front Matter....Pages -
Better Bootstrapping in Fully Homomorphic Encryption....Pages 1-16
Polly Cracker, Revisited, Revisited....Pages 17-33
Ring-LWE in Polynomial Rings....Pages 34-51
On Homomorphic Encryption and Chosen-Ciphertext Security....Pages 52-65
Waters Signatures with Optimal Security Reduction....Pages 66-83
Strong Security from Probabilistic Signature Schemes....Pages 84-101
Space Efficient Signature Schemes from the RSA Assumption....Pages 102-119
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles....Pages 120-137
Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes....Pages 138-155
Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited....Pages 156-171
Public-Key Identification Schemes Based on Multivariate Cubic Polynomials....Pages 172-189
Public-Key Cryptography from New Multivariate Quadratic Assumptions....Pages 190-205
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model....Pages 206-224
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts....Pages 225-242
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication....Pages 243-261
Public Key Encryption against Related Key Attacks....Pages 262-279
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices....Pages 280-297
Variants of Waters’ Dual System Primitives Using Asymmetric Pairings....Pages 298-315
From Selective to Full Security: Semi-generic Transformations in the Standard Model....Pages 316-333
Circular and KDM Security for Identity-Based Encryption....Pages 334-352
Generating Provable Primes Efficiently on Embedded Devices....Pages 353-371
Password-Based Authenticated Key Exchange....Pages 372-389
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series....Pages 390-397
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies....Pages 398-412
Efficiently Shuffling in Public....Pages 413-430
Efficient Password Authenticated Key Exchange via Oblivious Transfer....Pages 431-448
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices....Pages 449-466
Relatively-Sound NIZKs and Password-Based Key-Exchange....Pages 467-484
Multi-location Leakage Resilient Cryptography....Pages 485-503
On Definitions of Selective Opening Security....Pages 504-521
New Definitions and Separations for Circular Security....Pages 522-539
Correlated Product Security from Any One-Way Function....Pages 540-557
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms....Pages 558-575
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve....Pages 576-594
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith’s Methods....Pages 595-608
Extended-DDH and Lossy Trapdoor Functions....Pages 609-626
DDH-Like Assumptions Based on Extension Rings....Pages 627-643
Security of Blind Signatures Revisited....Pages 644-661
Efficient Network Coding Signatures in the Standard Model....Pages 662-679
Improved Security for Linearly Homomorphic Signatures: A Generic Framework....Pages 680-696
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking....Pages 697-714
Back Matter....Pages 715-732
....Pages -