Public-Key Cryptography -- PKC 2015

18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings

Jonathan Katz (Herausgeber)

Buch | Softcover
XIV, 824 Seiten
2015 | 2015
Springer Berlin (Verlag)
978-3-662-46446-5 (ISBN)

Lese- und Medienproben

Public-Key Cryptography -- PKC 2015 -
53,49 inkl. MwSt
This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015.The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based, predicate, and functional encryption.

Public-Key Encryption.- Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms.- On the Selective Opening Security of Practical Public-Key Encryption Schemes.- How Secure is Deterministic Encryption?.- E-Cash.- Divisible E-Cash Made Practical.- Anonymous Transferable E-Cash.- Cryptanalysis.- Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem.- A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems.- A Polynomial-Time Attack on the BBCRS Scheme.- Algebraic Cryptanalysis of a Quantum Money Scheme: The Noise-Free Case.- Digital Signatures.- Digital Signatures from Strong RSA without Prime Generation.- Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions.- Tightly-Secure Signatures from Chameleon Hash Functions.- Password-Based Authentication.- Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions.- Adaptive Witness Encryption and Asymmetric Password-Based Cryptography.- Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks.- Pairing-Based Cryptography.- Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds.- A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups.- Digital Signatures.- Simpler Efficient Group Signatures from Lattices.- Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based.- Secure Efficient History-Hiding Append-Only Signatures in the Standard Model.- Efficient Constructions.- One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.- Additively Homomorphic UC Commitments with Optimal Amortized Overhead.- Interactive Message-Locked Encryption and Secure Deduplication.- Faster ECC over F2521_1.- Cryptography with Imperfect Keys.- Continuous Non-malleable Key Derivation and Its Application to Related-Key Security.- A Tamper and Leakage Resilient von Neumann Architecture.- Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification.- Interactive Proofs.- Adaptive Proofs of Knowledge in the Random Oracle Model.- Making Sigma-Protocols Non-interactive Without Random Oracles.- Lattice-Based Cryptography.- Bootstrapping BGV Ciphertexts with a Wider Choice of p and q.- Packing Messages and Optimizing Bootstrapping in GSW-FHE.- Simple Lattice Trapdoor Sampling from a Broad Class of Distributions.- Identity-Based, Predicate, and Functional Encryption Simple Functional Encryption Schemes for Inner Products.- Predicate Encryption for Multi-Dimensional Range Queries from Lattices.- On the Practical Security of Inner Product Functional Encryption.- Identity-Based Encryption with (almost) Tight Security in the Multi-instance, Multi-ciphertext Setting.

Erscheint lt. Verlag 19.3.2015
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XIV, 824 p. 123 illus.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 1264 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Algorithm analysis and problem complexity • algorithms • Applications • authentication • Cloud Storage • code-based cryptography • Computer Science • conference proceedings • Cryptanalysis • cryptography • Digital Signatures • Elliptic Curve Cryptography • functional encryption • Gröbner Bases • Informatics • pairing based cryptography • Passwords • privacy • provable security • public key encryption • Re-encryption • Research • security protocols • Simulation Based Security • zero-knowledge arguments
ISBN-10 3-662-46446-2 / 3662464462
ISBN-13 978-3-662-46446-5 / 9783662464465
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
Mehr entdecken
aus dem Bereich