×

Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. (English) Zbl 1241.94004

Lecture Notes in Computer Science 7293. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). xiv, 734 p. (2012).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1208.94009].
Indexed articles:
Gentry, Craig; Halevi, Shai; Smart, Nigel P., Better bootstrapping in fully homomorphic encryption, 1-16 [Zbl 1290.94077]
Herold, Gottfried, Polly cracker, revisited, revisited, 17-33 [Zbl 1290.94086]
Ducas, Léo; Durmus, Alain, Ring-LWE in polynomial rings, 34-51 [Zbl 1290.94067]
Hemenway, Brett; Ostrovsky, Rafail, On homomorphic encryption and chosen-ciphertext security, 52-65 [Zbl 1252.94071]
Hofheinz, Dennis; Jager, Tibor; Knapp, Edward, Waters signatures with optimal security reduction, 66-83 [Zbl 1290.94088]
Schäge, Sven, Strong security from probabilistic signature schemes, 84-101 [Zbl 1252.94095]
Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru, Space efficient signature schemes from the RSA assumption, 102-119 [Zbl 1252.94116]
Huang, Qiong; Wong, Duncan S.; Susilo, Willy, The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles, 120-137 [Zbl 1290.94089]
Cayrel, Pierre-Louis; Hoffmann, Gerhard; Persichetti, Edoardo, Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes, 138-155 [Zbl 1290.94053]
Thomae, Enrico; Wolf, Christopher, Solving underdetermined systems of multivariate quadratic equations revisited, 156-171 [Zbl 1290.94134]
Sakumoto, Koichi, Public-key identification schemes based on multivariate cubic polynomials, 172-189 [Zbl 1290.94127]
Huang, Yun-Ju; Liu, Feng-Hao; Yang, Bo-Yin, Public-key cryptography from new multivariate quadratic assumptions, 190-205 [Zbl 1287.94073]
Libert, Benoît; Paterson, Kenneth G.; Quaglia, Elizabeth A., Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model, 206-224 [Zbl 1290.94107]
Fazio, Nelly; Perera, Irippuge Milinda, Outsider-anonymous broadcast encryption with sublinear ciphertexts, 225-242 [Zbl 1290.94071]
Yamada, Shota; Attrapadung, Nuttapong; Santoso, Bagus; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Kunihiro, Noboru, Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication, 243-261 [Zbl 1290.94158]
Wee, Hoeteck, Public key encryption against related key attacks, 262-279 [Zbl 1290.94138]
Agrawal, Shweta; Boyen, Xavier; Vaikuntanathan, Vinod; Voulgaris, Panagiotis; Wee, Hoeteck, Functional encryption for threshold functions (or fuzzy IBE) from lattices, 280-297 [Zbl 1290.94039]
Ramanna, Somindu C.; Chatterjee, Sanjit; Sarkar, Palash, Variants of Waters’ dual system primitives using asymmetric pairings. (Extended abstract), 298-315 [Zbl 1290.94121]
Abdalla, Michel; Fiore, Dario; Lyubashevsky, Vadim, From selective to full security: semi-generic transformations in the standard model, 316-333 [Zbl 1294.94028]
Alperin-Sheriff, Jacob; Peikert, Chris, Circular and KDM security for identity-based encryption, 334-352 [Zbl 1294.94030]
Steinfeld, Ron; Ling, San; Pieprzyk, Josef; Tartary, Christophe; Wang, Huaxiong, NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model, 353-371 [Zbl 1294.94079]
Clavier, Christophe; Feix, Benoit; Thierry, Loïc; Paillier, Pascal, Generating provable primes efficiently on embedded devices, 372-389 [Zbl 1294.94039]
Pointcheval, David, Password-based authenticated key exchange, 390-397 [Zbl 1294.94098]
Seo, Jae Hong; Cheon, Jung Hee; Katz, Jonathan, Constant-round multi-party private set union using reversed Laurent series, 398-412 [Zbl 1300.94092]
Stefanov, Emil; Shi, Elaine; Song, Dawn, Policy-enhanced private set intersection: sharing information while enforcing privacy policies, 413-430 [Zbl 1300.94095]
Udaya, Parampalli; Ramchen, Kim; Teague, Vanessa, Efficiently shuffling in public, 431-448 [Zbl 1300.94088]
Canetti, Ran; Dachman-Soled, Dana; Vaikuntanathan, Vinod; Wee, Hoeteck, Efficient password authenticated key exchange via oblivious transfer, 449-466 [Zbl 1296.94148]
Fujioka, Atsushi; Suzuki, Koutarou; Xagawa, Keita; Yoneyama, Kazuki, Strongly secure authenticated key exchange from factoring, codes, and lattices, 467-484 [Zbl 1300.94106]
Jutla, Charanjit; Roy, Arnab, Relatively-sound NIZKs and password-based key-exchange, 485-503 [Zbl 1300.94073]
Juma, Ali; Vahlis, Yevgeniy; Yung, Moti, Multi-location leakage resilient cryptography, 504-521 [Zbl 1300.94071]
Böhl, Florian; Hofheinz, Dennis; Kraschewski, Daniel, On definitions of selective opening security, 522-539 [Zbl 1300.94041]
Cash, David; Green, Matthew; Hohenberger, Susan, New definitions and separations for circular security, 540-557 [Zbl 1300.94044]
Hemenway, Brett; Lu, Steve; Ostrovsky, Rafail, Correlated product security from any one-way function, 558-575 [Zbl 1300.94058]
Matsuda, Takahiro; Hanaoka, Goichiro; Matsuura, Kanta, Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms, 576-594 [Zbl 1300.94083]
Sakemi, Yumi; Hanaoka, Goichiro; Izu, Tetsuya; Takenaka, Masahiko; Yasuda, Masaya, Solving a discrete logarithm problem with auxiliary input on a 160-bit elliptic curve, 595-608 [Zbl 1270.11125]
Bauer, Aurélie; Vergnaud, Damien; Zapalowicz, Jean-Christophe, Inferring sequences produced by nonlinear pseudorandom number generators using Coppersmith’s methods, 609-626 [Zbl 1291.11137]
Hemenway, Brett; Ostrovsky, Rafail, Extended-DDH and lossy trapdoor functions, 627-643 [Zbl 1291.94096]
Cramer, Ronald; Damgård, Ivan; Kiltz, Eike; Zakarias, Sarah; Zottarel, Angela, DDH-like assumptions based on extension rings, 644-661 [Zbl 1291.94072]
Schröder, Dominique; Unruh, Dominique, Security of blind signatures revisited, 662-679 [Zbl 1291.94198]
Catalano, Dario; Fiore, Dario; Warinschi, Bogdan, Efficient network coding signatures in the standard model, 680-696 [Zbl 1291.94182]
Freeman, David Mandell, Improved security for linearly homomorphic signatures: a generic framework, 697-714 [Zbl 1291.94186]
Sakai, Yusuke; Schuldt, Jacob C. N.; Emura, Keita; Hanaoka, Goichiro; Ohta, Kazuo, On the security of dynamic group signatures: preventing signature hijacking, 715-732 [Zbl 1291.94196]

MSC:

94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest

Citations:

Zbl 1208.94009
PDFBibTeX XMLCite
Full Text: DOI