Atjaunināt sīkdatņu piekrišanu

Public Key Cryptography -- PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012, Proceedings [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 734 pages, height x width: 235x155 mm, weight: 1117 g, 63 Illustrations, black and white; XIV, 734 p. 63 illus., 1 Paperback / softback
  • Sērija : Security and Cryptology 7293
  • Izdošanas datums: 09-May-2012
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642300561
  • ISBN-13: 9783642300561
  • Mīkstie vāki
  • Cena: 58,86 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 734 pages, height x width: 235x155 mm, weight: 1117 g, 63 Illustrations, black and white; XIV, 734 p. 63 illus., 1 Paperback / softback
  • Sērija : Security and Cryptology 7293
  • Izdošanas datums: 09-May-2012
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642300561
  • ISBN-13: 9783642300561
This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.
Homomorphic Encryption and LWE
Better Bootstrapping in Fully Homomorphic Encryption
1(16)
Craig Gentry
Shai Halevi
Nigel P. Smart
Polly Cracker, Revisited, Revisited
17(17)
Gottfried Herold
Ring-LWE in Polynomial Rings
34(18)
Leo Ducas
Alain Durmus
On Homomorphic Encryption and Chosen-Ciphertext Security
52(14)
Brett Hemenway
Rafail Ostrovsky
Signature Schemes
Waters Signatures with Optimal Security Reduction
66(18)
Dennis Hofheinz
Tibor Jager
Edward Knapp
Strong Security from Probabilistic Signature Schemes
84(18)
Sven Schage
Space Efficient Signature Schemes from the RSA Assumption
102(18)
Shota Yamada
Goichiro Hanaoka
Noboru Kunihiro
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles
120(18)
Qiong Huang
Duncan S. Wong
Willy Susilo
Code-Based and Multivariate Crypto
Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes
138(18)
Pierre-Louis Cayrel
Gerhard Hoffmann
Edoardo Persichetti
Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited
156(16)
Enrico Thomae
Christopher Wolf
Public-Key Identification Schemes Based on Multivariate Cubic Polynomials
172(18)
Koichi Sakumoto
Public-Key Cryptography from New Multivariate Quadratic Assumptions
190(16)
Yun-Ju Huang
Feng-Hao Liu
Bo-Yin Yang
Public-Key Encryption: Special Properties
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
206(19)
Benoit Libert
Kenneth G. Paterson
Elizabeth A. Quaglia
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
225(18)
Nelly Fazio
Irippuge Milinda Perera
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication
243(19)
Shota Yamada
Nuttapong Attrapadung
Bagus Santoso
Jacob C.N. Schuldt
Goichiro Hanaoka
Noboru Kunihiro
Public Key Encryption against Related Key Attacks
262(18)
Hoeteck Wee
Identity-Based Encryption
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
280(18)
Shweta Agrawal
Xavier Boyen
Vinod Vaikuntanathan
Panagiotis Voulgaris
Hoeteck Wee
Variants of Waters' Dual System Primitives Using Asymmetric Pairings (Extended Abstract)
298(18)
Somindu C. Ramanna
Sanjit Chatterjee
Palash Sarkar
From Selective to Full Security: Semi-generic Transformations in the Standard Model
316(18)
Michel Abdalla
Dario Fiore
Vadim Lyubashevsky
Circular and KDM Security for Identity-Based Encryption
334(19)
Jacob Alperin-Sheriff
Chris Peikert
Public-Key Encryption: Constructions
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
353(19)
Ron Steinfeld
San Ling
Josef Pieprzyk
Christophe Tartary
Huaxiong Wang
Generating Provable Primes Efficiently on Embedded Devices
372(18)
Christophe Clavier
Benoit Feix
Loic Thierry
Pascal Paillier
Invited Talk
Password-Based Authenticated Key Exchange
390(8)
David Pointcheval
Secure Two-Party and Multi-party Computations
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series
398(15)
Jae Hong Seo
Jung Hee Cheon
Jonathan Katz
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
413(18)
Emil Stefanov
Elaine Shi
Dawn Song
Efficiently Shuffling in Public
431(18)
Udaya Parampalli
Kim Ramchen
Vanessa Teague
Key Exchange and Secure Sessions
Efficient Password Authenticated Key Exchange via Oblivious Transfer
449(18)
Ran Canetti
Dana Dachman-Soled
Vinod Vaikuntanathan
Hoeteck Wee
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
467(18)
Atsushi Fujioka
Koutarou Suzuki
Keita Xagawa
Kazuki Yoneyama
Relatively-Sound NIZKs and Password-Based Key-Exchange
485(19)
Charanjit Jutla
Arnab Roy
Multi-location Leakage Resilient Cryptography
504(18)
Ali Juma
Yevgeniy Vahlis
Moti Yung
Public-Key Encryption: Relationships
On Definitions of Selective Opening Security
522(18)
Florian Bohl
Dennis Hofheinz
Daniel Kraschewski
New Definitions and Separations for Circular Security
540(18)
David Cash
Matthew Green
Susan Hohenberger
Correlated Product Security from Any One-Way Function
558(18)
Brett Hemenway
Steve Lu
Rafail Ostrovsky
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms
576(19)
Takahiro Matsuda
Goichiro Hanaoka
Kanta Matsuura
DL, DDH, and More Number Theory
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve
595(14)
Yumi Sakemi
Goichiro Hanaoka
Tetsuya Izu
Masahiko Takenaka
Masaya Yasuda
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods
609(18)
Aurelie Bauer
Damien Vergnaud
Jean-Christophe Zapalowicz
Extended-DDH and Lossy Trapdoor Functions
627(17)
Brett Hemenway
Rafail Ostrovsky
DDH-Like Assumptions Based on Extension Rings
644(18)
Ronald Cramer
Ivan Damgard
Eike Kiltz
Sarah Zakarias
Angela Zottarel
Beyond Ordinary Signature Schemes
Security of Blind Signatures Revisited
662(18)
Dominique Schroder
Dominique Unruh
Efficient Network Coding Signatures in the Standard Model
680(17)
Dario Catalano
Dario Fiore
Bogdan Warinschi
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
697(18)
David Mandell Freeman
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
715(18)
Yusuke Sakai
Jacob C.N. Schuldt
Keita Emura
Goichiro Hanaoka
Kazuo Ohta
Author Index 733