This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013.
The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols.
Author(s): Zvika Brakerski, Craig Gentry, Shai Halevi (auth.), Kaoru Kurosawa, Goichiro Hanaoka (eds.)
Series: Lecture Notes in Computer Science 7778
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2013
Language: English
Pages: 518
Tags: Data Encryption; Systems and Data Security; Coding and Information Theory; e-Commerce/e-business; Computer Appl. in Administrative Data Processing
Front Matter....Pages -
Packed Ciphertexts in LWE-Based Homomorphic Encryption....Pages 1-13
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption....Pages 14-31
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption....Pages 32-50
Functional Encryption: Origins and Recent Developments....Pages 51-54
Vector Commitments and Their Applications....Pages 55-72
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS....Pages 73-88
Cryptography Using Captcha Puzzles....Pages 89-106
Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications....Pages 107-124
Decentralized Attribute-Based Signatures....Pages 125-142
On the Semantic Security of Functional Encryption Schemes....Pages 143-161
Attribute-Based Encryption with Fast Decryption....Pages 162-179
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors....Pages 180-197
Combined Attack on CRT-RSA....Pages 198-215
Revocable Identity-Based Encryption Revisited: Security Model and Construction....Pages 216-234
Improved (Hierarchical) Inner-Product Encryption from Lattices....Pages 235-252
Techniques for Efficient Secure Computation Based on Yao’s Protocol....Pages 253-253
Non-Interactive Key Exchange....Pages 254-271
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages....Pages 272-291
Tighter Reductions for Forward-Secure Signature Schemes....Pages 292-311
Tagged One-Time Signatures: Tight Security and Optimal Tag Size....Pages 312-331
Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited....Pages 332-351
Robust Encryption, Revisited....Pages 352-368
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited....Pages 369-385
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures....Pages 386-404
Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES....Pages 405-422
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies....Pages 423-442
New Constructions and Applications of Trapdoor DDH Groups....Pages 443-460
Rate-Limited Secure Function Evaluation: Definitions and Constructions....Pages 461-478
Verifiable Elections That Scale for Free....Pages 479-496
On the Connection between Leakage Tolerance and Adaptive Security....Pages 497-515
Back Matter....Pages -