|
Homomorphic Encryption and LWE |
|
|
|
Better Bootstrapping in Fully Homomorphic Encryption |
|
|
1 | (16) |
|
|
|
|
Polly Cracker, Revisited, Revisited |
|
|
17 | (17) |
|
|
Ring-LWE in Polynomial Rings |
|
|
34 | (18) |
|
|
|
On Homomorphic Encryption and Chosen-Ciphertext Security |
|
|
52 | (14) |
|
|
|
|
|
Waters Signatures with Optimal Security Reduction |
|
|
66 | (18) |
|
|
|
|
Strong Security from Probabilistic Signature Schemes |
|
|
84 | (18) |
|
|
Space Efficient Signature Schemes from the RSA Assumption |
|
|
102 | (18) |
|
|
|
|
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles |
|
|
120 | (18) |
|
|
|
|
Code-Based and Multivariate Crypto |
|
|
|
Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes |
|
|
138 | (18) |
|
|
|
|
Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited |
|
|
156 | (16) |
|
|
|
Public-Key Identification Schemes Based on Multivariate Cubic Polynomials |
|
|
172 | (18) |
|
|
Public-Key Cryptography from New Multivariate Quadratic Assumptions |
|
|
190 | (16) |
|
|
|
|
Public-Key Encryption: Special Properties |
|
|
|
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model |
|
|
206 | (19) |
|
|
|
|
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts |
|
|
225 | (18) |
|
|
|
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication |
|
|
243 | (19) |
|
|
|
|
|
|
|
Public Key Encryption against Related Key Attacks |
|
|
262 | (18) |
|
|
Identity-Based Encryption |
|
|
|
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices |
|
|
280 | (18) |
|
|
|
|
|
|
Variants of Waters' Dual System Primitives Using Asymmetric Pairings (Extended Abstract) |
|
|
298 | (18) |
|
|
|
|
From Selective to Full Security: Semi-generic Transformations in the Standard Model |
|
|
316 | (18) |
|
|
|
|
Circular and KDM Security for Identity-Based Encryption |
|
|
334 | (19) |
|
|
|
Public-Key Encryption: Constructions |
|
|
|
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model |
|
|
353 | (19) |
|
|
|
|
|
|
Generating Provable Primes Efficiently on Embedded Devices |
|
|
372 | (18) |
|
|
|
|
|
|
|
Password-Based Authenticated Key Exchange |
|
|
390 | (8) |
|
|
Secure Two-Party and Multi-party Computations |
|
|
|
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series |
|
|
398 | (15) |
|
|
|
|
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies |
|
|
413 | (18) |
|
|
|
|
Efficiently Shuffling in Public |
|
|
431 | (18) |
|
|
|
|
Key Exchange and Secure Sessions |
|
|
|
Efficient Password Authenticated Key Exchange via Oblivious Transfer |
|
|
449 | (18) |
|
|
|
|
|
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices |
|
|
467 | (18) |
|
|
|
|
|
Relatively-Sound NIZKs and Password-Based Key-Exchange |
|
|
485 | (19) |
|
|
|
Multi-location Leakage Resilient Cryptography |
|
|
504 | (18) |
|
|
|
|
Public-Key Encryption: Relationships |
|
|
|
On Definitions of Selective Opening Security |
|
|
522 | (18) |
|
|
|
|
New Definitions and Separations for Circular Security |
|
|
540 | (18) |
|
|
|
|
Correlated Product Security from Any One-Way Function |
|
|
558 | (18) |
|
|
|
|
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms |
|
|
576 | (19) |
|
|
|
|
DL, DDH, and More Number Theory |
|
|
|
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve |
|
|
595 | (14) |
|
|
|
|
|
|
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods |
|
|
609 | (18) |
|
|
|
Jean-Christophe Zapalowicz |
|
|
Extended-DDH and Lossy Trapdoor Functions |
|
|
627 | (17) |
|
|
|
DDH-Like Assumptions Based on Extension Rings |
|
|
644 | (18) |
|
|
|
|
|
|
Beyond Ordinary Signature Schemes |
|
|
|
Security of Blind Signatures Revisited |
|
|
662 | (18) |
|
|
|
Efficient Network Coding Signatures in the Standard Model |
|
|
680 | (17) |
|
|
|
|
Improved Security for Linearly Homomorphic Signatures: A Generic Framework |
|
|
697 | (18) |
|
|
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking |
|
|
715 | (18) |
|
|
|
|
|
Author Index |
|
733 | |