Public-Key Cryptography – PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.

Author(s): Hugo Krawczyk (eds.)
Series: Lecture Notes in Computer Science 8383 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2014

Language: English
Pages: 686
Tags: Data Encryption; Systems and Data Security; Coding and Information Theory; Algorithm Analysis and Problem Complexity

Front Matter....Pages -
Simple Chosen-Ciphertext Security from Low-Noise LPN....Pages 1-18
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing....Pages 19-36
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware ( sPA1 ) Encryption Scheme....Pages 37-55
Chosen Ciphertext Security via UCE....Pages 56-76
Proxy Re-encryption from Lattices....Pages 77-94
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices....Pages 95-112
Verifiable Set Operations over Outsourced Databases....Pages 113-130
Verifiable Oblivious Storage....Pages 131-148
Achieving Privacy in Verifiable Computation with Multiple Servers – Without FHE and without Pre-processing....Pages 149-166
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting....Pages 167-184
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences....Pages 185-202
Elliptic and Hyperelliptic Curves: A Practical Security Analysis....Pages 203-220
Discrete Logarithm in GF(2 809 ) with FFS....Pages 221-238
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications....Pages 239-256
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts....Pages 257-274
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption....Pages 275-292
Online/Offline Attribute-Based Encryption....Pages 293-310
Scale-Invariant Fully Homomorphic Encryption over the Integers....Pages 311-328
Enhanced Chosen-Ciphertext Security and Applications....Pages 329-344
Lattice-Based Group Signature Scheme with Verifier-Local Revocation....Pages 345-361
Leakage-Resilient Signatures with Graceful Degradation....Pages 362-379
On the Lossiness of the Rabin Trapdoor Function....Pages 380-398
Solving Random Subset Sum Problem by l p -norm SVP Oracle....Pages 399-410
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice....Pages 411-428
Lazy Modulus Switching for the BKW Algorithm on LWE....Pages 429-445
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions....Pages 446-464
Related Randomness Attacks for Public Key Encryption....Pages 465-482
Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks....Pages 483-500
Functional Signatures and Pseudorandom Functions....Pages 501-519
Policy-Based Signatures....Pages 520-537
Generalizing Homomorphic MACs for Arithmetic Circuits....Pages 538-555
General Impossibility of Group Homomorphic Encryption in the Quantum World....Pages 556-573
On Minimal Assumptions for Sender-Deniable Public Key Encryption....Pages 574-591
Traceable Group Encryption....Pages 592-610
Practical Covert Authentication....Pages 611-629
Fine-Tuning Groth-Sahai Proofs....Pages 630-649
Cross-Domain Secure Computation....Pages 650-668
On the Security of the Pre-shared Key Ciphersuites of TLS....Pages 669-684
Back Matter....Pages -