Fischlin, Marc (ed.); Buchmann, Johannes (ed.); Manulis, Mark (ed.) Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. (English) Zbl 1241.94004 Lecture Notes in Computer Science 7293. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). xiv, 734 p. (2012). Show indexed articles as search result. The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1208.94009].Indexed articles:Gentry, Craig; Halevi, Shai; Smart, Nigel P., Better bootstrapping in fully homomorphic encryption, 1-16 [Zbl 1290.94077]Herold, Gottfried, Polly cracker, revisited, revisited, 17-33 [Zbl 1290.94086]Ducas, Léo; Durmus, Alain, Ring-LWE in polynomial rings, 34-51 [Zbl 1290.94067]Hemenway, Brett; Ostrovsky, Rafail, On homomorphic encryption and chosen-ciphertext security, 52-65 [Zbl 1252.94071]Hofheinz, Dennis; Jager, Tibor; Knapp, Edward, Waters signatures with optimal security reduction, 66-83 [Zbl 1290.94088]Schäge, Sven, Strong security from probabilistic signature schemes, 84-101 [Zbl 1252.94095]Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru, Space efficient signature schemes from the RSA assumption, 102-119 [Zbl 1252.94116]Huang, Qiong; Wong, Duncan S.; Susilo, Willy, The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles, 120-137 [Zbl 1290.94089]Cayrel, Pierre-Louis; Hoffmann, Gerhard; Persichetti, Edoardo, Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes, 138-155 [Zbl 1290.94053]Thomae, Enrico; Wolf, Christopher, Solving underdetermined systems of multivariate quadratic equations revisited, 156-171 [Zbl 1290.94134]Sakumoto, Koichi, Public-key identification schemes based on multivariate cubic polynomials, 172-189 [Zbl 1290.94127]Huang, Yun-Ju; Liu, Feng-Hao; Yang, Bo-Yin, Public-key cryptography from new multivariate quadratic assumptions, 190-205 [Zbl 1287.94073]Libert, Benoît; Paterson, Kenneth G.; Quaglia, Elizabeth A., Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model, 206-224 [Zbl 1290.94107]Fazio, Nelly; Perera, Irippuge Milinda, Outsider-anonymous broadcast encryption with sublinear ciphertexts, 225-242 [Zbl 1290.94071]Yamada, Shota; Attrapadung, Nuttapong; Santoso, Bagus; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Kunihiro, Noboru, Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication, 243-261 [Zbl 1290.94158]Wee, Hoeteck, Public key encryption against related key attacks, 262-279 [Zbl 1290.94138]Agrawal, Shweta; Boyen, Xavier; Vaikuntanathan, Vinod; Voulgaris, Panagiotis; Wee, Hoeteck, Functional encryption for threshold functions (or fuzzy IBE) from lattices, 280-297 [Zbl 1290.94039]Ramanna, Somindu C.; Chatterjee, Sanjit; Sarkar, Palash, Variants of Waters’ dual system primitives using asymmetric pairings. (Extended abstract), 298-315 [Zbl 1290.94121]Abdalla, Michel; Fiore, Dario; Lyubashevsky, Vadim, From selective to full security: semi-generic transformations in the standard model, 316-333 [Zbl 1294.94028]Alperin-Sheriff, Jacob; Peikert, Chris, Circular and KDM security for identity-based encryption, 334-352 [Zbl 1294.94030]Steinfeld, Ron; Ling, San; Pieprzyk, Josef; Tartary, Christophe; Wang, Huaxiong, NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model, 353-371 [Zbl 1294.94079]Clavier, Christophe; Feix, Benoit; Thierry, Loïc; Paillier, Pascal, Generating provable primes efficiently on embedded devices, 372-389 [Zbl 1294.94039]Pointcheval, David, Password-based authenticated key exchange, 390-397 [Zbl 1294.94098]Seo, Jae Hong; Cheon, Jung Hee; Katz, Jonathan, Constant-round multi-party private set union using reversed Laurent series, 398-412 [Zbl 1300.94092]Stefanov, Emil; Shi, Elaine; Song, Dawn, Policy-enhanced private set intersection: sharing information while enforcing privacy policies, 413-430 [Zbl 1300.94095]Udaya, Parampalli; Ramchen, Kim; Teague, Vanessa, Efficiently shuffling in public, 431-448 [Zbl 1300.94088]Canetti, Ran; Dachman-Soled, Dana; Vaikuntanathan, Vinod; Wee, Hoeteck, Efficient password authenticated key exchange via oblivious transfer, 449-466 [Zbl 1296.94148]Fujioka, Atsushi; Suzuki, Koutarou; Xagawa, Keita; Yoneyama, Kazuki, Strongly secure authenticated key exchange from factoring, codes, and lattices, 467-484 [Zbl 1300.94106]Jutla, Charanjit; Roy, Arnab, Relatively-sound NIZKs and password-based key-exchange, 485-503 [Zbl 1300.94073]Juma, Ali; Vahlis, Yevgeniy; Yung, Moti, Multi-location leakage resilient cryptography, 504-521 [Zbl 1300.94071]Böhl, Florian; Hofheinz, Dennis; Kraschewski, Daniel, On definitions of selective opening security, 522-539 [Zbl 1300.94041]Cash, David; Green, Matthew; Hohenberger, Susan, New definitions and separations for circular security, 540-557 [Zbl 1300.94044]Hemenway, Brett; Lu, Steve; Ostrovsky, Rafail, Correlated product security from any one-way function, 558-575 [Zbl 1300.94058]Matsuda, Takahiro; Hanaoka, Goichiro; Matsuura, Kanta, Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms, 576-594 [Zbl 1300.94083]Sakemi, Yumi; Hanaoka, Goichiro; Izu, Tetsuya; Takenaka, Masahiko; Yasuda, Masaya, Solving a discrete logarithm problem with auxiliary input on a 160-bit elliptic curve, 595-608 [Zbl 1270.11125]Bauer, Aurélie; Vergnaud, Damien; Zapalowicz, Jean-Christophe, Inferring sequences produced by nonlinear pseudorandom number generators using Coppersmith’s methods, 609-626 [Zbl 1291.11137]Hemenway, Brett; Ostrovsky, Rafail, Extended-DDH and lossy trapdoor functions, 627-643 [Zbl 1291.94096]Cramer, Ronald; Damgård, Ivan; Kiltz, Eike; Zakarias, Sarah; Zottarel, Angela, DDH-like assumptions based on extension rings, 644-661 [Zbl 1291.94072]Schröder, Dominique; Unruh, Dominique, Security of blind signatures revisited, 662-679 [Zbl 1291.94198]Catalano, Dario; Fiore, Dario; Warinschi, Bogdan, Efficient network coding signatures in the standard model, 680-696 [Zbl 1291.94182]Freeman, David Mandell, Improved security for linearly homomorphic signatures: a generic framework, 697-714 [Zbl 1291.94186]Sakai, Yusuke; Schuldt, Jacob C. N.; Emura, Keita; Hanaoka, Goichiro; Ohta, Kazuo, On the security of dynamic group signatures: preventing signature hijacking, 715-732 [Zbl 1291.94196] Cited in 1 ReviewCited in 4 Documents MSC: 94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory 94A60 Cryptography 00B25 Proceedings of conferences of miscellaneous specific interest Citations:Zbl 1208.94009 PDFBibTeX XMLCite \textit{M. Fischlin} (ed.) et al., Public key cryptography -- PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21--23, 2012. Proceedings. Berlin: Springer (2012; Zbl 1241.94004) Full Text: DOI