Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013.
The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols.

Author(s): Zvika Brakerski, Craig Gentry, Shai Halevi (auth.), Kaoru Kurosawa, Goichiro Hanaoka (eds.)
Series: Lecture Notes in Computer Science 7778
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2013

Language: English
Pages: 518
Tags: Data Encryption; Systems and Data Security; Coding and Information Theory; e-Commerce/e-business; Computer Appl. in Administrative Data Processing

Front Matter....Pages -
Packed Ciphertexts in LWE-Based Homomorphic Encryption....Pages 1-13
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption....Pages 14-31
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption....Pages 32-50
Functional Encryption: Origins and Recent Developments....Pages 51-54
Vector Commitments and Their Applications....Pages 55-72
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS....Pages 73-88
Cryptography Using Captcha Puzzles....Pages 89-106
Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications....Pages 107-124
Decentralized Attribute-Based Signatures....Pages 125-142
On the Semantic Security of Functional Encryption Schemes....Pages 143-161
Attribute-Based Encryption with Fast Decryption....Pages 162-179
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors....Pages 180-197
Combined Attack on CRT-RSA....Pages 198-215
Revocable Identity-Based Encryption Revisited: Security Model and Construction....Pages 216-234
Improved (Hierarchical) Inner-Product Encryption from Lattices....Pages 235-252
Techniques for Efficient Secure Computation Based on Yao’s Protocol....Pages 253-253
Non-Interactive Key Exchange....Pages 254-271
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages....Pages 272-291
Tighter Reductions for Forward-Secure Signature Schemes....Pages 292-311
Tagged One-Time Signatures: Tight Security and Optimal Tag Size....Pages 312-331
Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited....Pages 332-351
Robust Encryption, Revisited....Pages 352-368
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited....Pages 369-385
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures....Pages 386-404
Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES....Pages 405-422
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies....Pages 423-442
New Constructions and Applications of Trapdoor DDH Groups....Pages 443-460
Rate-Limited Secure Function Evaluation: Definitions and Constructions....Pages 461-478
Verifiable Elections That Scale for Free....Pages 479-496
On the Connection between Leakage Tolerance and Adaptive Security....Pages 497-515
Back Matter....Pages -