default search action
15. PKC 2013: Nara, Japan
- Kaoru Kurosawa, Goichiro Hanaoka:
Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings. Lecture Notes in Computer Science 7778, Springer 2013, ISBN 978-3-642-36361-0
Homomorphic Encryption
- Zvika Brakerski, Craig Gentry, Shai Halevi:
Packed Ciphertexts in LWE-Based Homomorphic Encryption. 1-13 - Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou:
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption. 14-31 - Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda, Shota Yamada:
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption. 32-50
Invited Talk (1)
- Brent Waters:
Functional Encryption: Origins and Recent Developments. 51-54
Primitives
- Dario Catalano, Dario Fiore:
Vector Commitments and Their Applications. 55-72 - Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou:
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS. 73-88 - Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia:
Cryptography Using Captcha Puzzles. 89-106 - San Ling, Khoa Nguyen, Damien Stehlé, Huaxiong Wang:
Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications. 107-124
Functional Encryption/Signatures
- Tatsuaki Okamoto, Katsuyuki Takashima:
Decentralized Attribute-Based Signatures. 125-142 - Manuel Barbosa, Pooya Farshim:
On the Semantic Security of Functional Encryption Schemes. 143-161 - Susan Hohenberger, Brent Waters:
Attribute-Based Encryption with Fast Decryption. 162-179
On RSA
- Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors. 180-197 - Guillaume Barbu, Alberto Battistello, Guillaume Dabosville, Christophe Giraud, Guénaël Renault, Soline Renner, Rina Zeitoun:
Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public? 198-215
IBE and IPE
- Jae Hong Seo, Keita Emura:
Revocable Identity-Based Encryption Revisited: Security Model and Construction. 216-234 - Keita Xagawa:
Improved (Hierarchical) Inner-Product Encryption from Lattices. 235-252
Invited Talk (2)
- Yehuda Lindell:
Techniques for Efficient Secure Computation Based on Yao's Protocol. 253
Key Exchange
- Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson:
Non-Interactive Key Exchange. 254-271 - Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud:
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages. 272-291
Signature Schemes I
- Michel Abdalla, Fabrice Ben Hamouda, David Pointcheval:
Tighter Reductions for Forward-Secure Signature Schemes. 292-311 - Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo:
Tagged One-Time Signatures: Tight Security and Optimal Tag Size. 312-331
Encryption
- Takahiro Matsuda, Goichiro Hanaoka:
Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited. 332-351 - Pooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia:
Robust Encryption, Revisited. 352-368 - Zhengan Huang, Shengli Liu, Baodong Qin:
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited. 369-385
Signature Schemes II
- Nuttapong Attrapadung, Benoît Libert, Thomas Peters:
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures. 386-404 - Ryo Nishimaki, Keita Xagawa:
Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES. 405-422 - Kwangsu Lee, Dong Hoon Lee, Moti Yung:
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies. 423-442 - Yannick Seurin:
New Constructions and Applications of Trapdoor DDH Groups. 443-460
Protocols
- Özgür Dagdelen, Payman Mohassel, Daniele Venturi:
Rate-Limited Secure Function Evaluation: Definitions and Constructions. 461-478 - Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Verifiable Elections That Scale for Free. 479-496 - Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel:
On the Connection between Leakage Tolerance and Adaptive Security. 497-515
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.