Public-Key Cryptography -- PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based, predicate, and functional encryption.

Author(s): Jonathan Katz (eds.)
Series: Lecture Notes in Computer Science 9020
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2015

Language: English
Pages: 824
Tags: Data Encryption; Systems and Data Security; Coding and Information Theory; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems

Front Matter....Pages I-XIV
Front Matter....Pages 1-1
Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms....Pages 3-26
On the Selective Opening Security of Practical Public-Key Encryption Schemes....Pages 27-51
How Secure is Deterministic Encryption?....Pages 52-73
Front Matter....Pages 75-75
Divisible E-Cash Made Practical....Pages 77-100
Anonymous Transferable E-Cash....Pages 101-124
Front Matter....Pages 125-125
Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem....Pages 127-149
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems....Pages 150-174
A Polynomial-Time Attack on the BBCRS Scheme....Pages 175-193
Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case....Pages 194-213
Front Matter....Pages 215-215
Digital Signatures from Strong RSA without Prime Generation....Pages 217-235
Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions....Pages 236-255
Tightly-Secure Signatures from Chameleon Hash Functions....Pages 256-279
Front Matter....Pages 281-281
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions....Pages 283-307
Adaptive Witness Encryption and Asymmetric Password-Based Cryptography....Pages 308-331
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks....Pages 332-352
Front Matter....Pages 353-353
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds....Pages 355-376
A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups....Pages 377-398
Front Matter....Pages 399-399
Simpler Efficient Group Signatures from Lattices....Pages 401-426
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based....Pages 427-449
Secure Efficient History-Hiding Append-Only Signatures in the Standard Model....Pages 450-473
Front Matter....Pages 475-475
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model....Pages 477-494
Additively Homomorphic UC Commitments with Optimal Amortized Overhead....Pages 495-515
Interactive Message-Locked Encryption and Secure Deduplication....Pages 516-538
Faster ECC over $$\mathbb {F}_{2^{521}-1}$$ ....Pages 539-553
Front Matter....Pages 555-555
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security....Pages 557-578
A Tamper and Leakage Resilient von Neumann Architecture....Pages 579-603
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification....Pages 604-626
Front Matter....Pages 627-627
Adaptive Proofs of Knowledge in the Random Oracle Model....Pages 629-649
Making Sigma-Protocols Non-interactive Without Random Oracles....Pages 650-670
Front Matter....Pages 671-671
Bootstrapping BGV Ciphertexts with a Wider Choice of $$p$$ and $$q$$ ....Pages 673-698
Packing Messages and Optimizing Bootstrapping in GSW-FHE....Pages 699-715
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions....Pages 716-730
Front Matter....Pages 731-731
Simple Functional Encryption Schemes for Inner Products....Pages 733-751
Predicate Encryption for Multi-dimensional Range Queries from Lattices....Pages 752-776
On the Practical Security of Inner Product Functional Encryption....Pages 777-798
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting....Pages 799-822
Back Matter....Pages 823-824