Public Key Cryptography – PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.

Author(s): Craig Gentry, Shai Halevi, Nigel P. Smart (auth.), Marc Fischlin, Johannes Buchmann, Mark Manulis (eds.)
Series: Lecture Notes in Computer Science 7293 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2012

Language: English
Pages: 734
City: Berlin ; New York
Tags: Data Encryption; Computer Communication Networks; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Systems and Data Security; Discrete Mathematics in Computer Science

Front Matter....Pages -
Better Bootstrapping in Fully Homomorphic Encryption....Pages 1-16
Polly Cracker, Revisited, Revisited....Pages 17-33
Ring-LWE in Polynomial Rings....Pages 34-51
On Homomorphic Encryption and Chosen-Ciphertext Security....Pages 52-65
Waters Signatures with Optimal Security Reduction....Pages 66-83
Strong Security from Probabilistic Signature Schemes....Pages 84-101
Space Efficient Signature Schemes from the RSA Assumption....Pages 102-119
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles....Pages 120-137
Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes....Pages 138-155
Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited....Pages 156-171
Public-Key Identification Schemes Based on Multivariate Cubic Polynomials....Pages 172-189
Public-Key Cryptography from New Multivariate Quadratic Assumptions....Pages 190-205
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model....Pages 206-224
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts....Pages 225-242
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication....Pages 243-261
Public Key Encryption against Related Key Attacks....Pages 262-279
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices....Pages 280-297
Variants of Waters’ Dual System Primitives Using Asymmetric Pairings....Pages 298-315
From Selective to Full Security: Semi-generic Transformations in the Standard Model....Pages 316-333
Circular and KDM Security for Identity-Based Encryption....Pages 334-352
NTRUCCA : How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model....Pages 353-371
Generating Provable Primes Efficiently on Embedded Devices....Pages 372-389
Password-Based Authenticated Key Exchange....Pages 390-397
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series....Pages 398-412
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies....Pages 413-430
Efficiently Shuffling in Public....Pages 431-448
Efficient Password Authenticated Key Exchange via Oblivious Transfer....Pages 449-466
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices....Pages 467-484
Relatively-Sound NIZKs and Password-Based Key-Exchange....Pages 485-503
Multi-location Leakage Resilient Cryptography....Pages 504-521
On Definitions of Selective Opening Security....Pages 522-539
New Definitions and Separations for Circular Security....Pages 540-557
Correlated Product Security from Any One-Way Function....Pages 558-575
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms....Pages 576-594
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve....Pages 595-608
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith’s Methods....Pages 609-626
Extended-DDH and Lossy Trapdoor Functions....Pages 627-643
DDH-Like Assumptions Based on Extension Rings....Pages 644-661
Security of Blind Signatures Revisited....Pages 662-679
Efficient Network Coding Signatures in the Standard Model....Pages 680-696
Improved Security for Linearly Homomorphic Signatures: A Generic Framework....Pages 697-714
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking....Pages 715-732
Back Matter....Pages -