Public Key Cryptography – PKC 2012

15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings

Editors:

ISBN: 978-3-642-30056-1 (Print) 978-3-642-30057-8 (Online)

Table of contents (42 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. Homomorphic Encryption and LWE

    1. No Access

      Book Chapter

      Pages 1-16

      Better Bootstrapping in Fully Homomorphic Encryption

    2. No Access

      Book Chapter

      Pages 17-33

      Polly Cracker, Revisited, Revisited

    3. No Access

      Book Chapter

      Pages 34-51

      Ring-LWE in Polynomial Rings

    4. No Access

      Book Chapter

      Pages 52-65

      On Homomorphic Encryption and Chosen-Ciphertext Security

  3. Signature Schemes

    1. No Access

      Book Chapter

      Pages 66-83

      Waters Signatures with Optimal Security Reduction

    2. No Access

      Book Chapter

      Pages 84-101

      Strong Security from Probabilistic Signature Schemes

    3. No Access

      Book Chapter

      Pages 102-119

      Space Efficient Signature Schemes from the RSA Assumption

    4. No Access

      Book Chapter

      Pages 120-137

      The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles

  4. Code-Based and Multivariate Crypto

    1. No Access

      Book Chapter

      Pages 138-155

      Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes

    2. No Access

      Book Chapter

      Pages 156-171

      Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited

    3. No Access

      Book Chapter

      Pages 172-189

      Public-Key Identification Schemes Based on Multivariate Cubic Polynomials

    4. No Access

      Book Chapter

      Pages 190-205

      Public-Key Cryptography from New Multivariate Quadratic Assumptions

  5. Public-Key Encryption: Special Properties

    1. No Access

      Book Chapter

      Pages 206-224

      Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

    2. No Access

      Book Chapter

      Pages 225-242

      Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts

    3. No Access

      Book Chapter

      Pages 243-261

      Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication

    4. No Access

      Book Chapter

      Pages 262-279

      Public Key Encryption against Related Key Attacks

  6. Identity-Based Encryption

    1. No Access

      Book Chapter

      Pages 280-297

      Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices

    2. No Access

      Book Chapter

      Pages 298-315

      Variants of Waters’ Dual System Primitives Using Asymmetric Pairings

    3. No Access

      Book Chapter

      Pages 316-333

      From Selective to Full Security: Semi-generic Transformations in the Standard Model

    4. No Access

      Book Chapter

      Pages 334-352

      Circular and KDM Security for Identity-Based Encryption

previous Page of 3