Public Key Cryptography – PKC 2012

15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings

  • Marc Fischlin
  • Johannes Buchmann
  • Mark Manulis
Conference proceedings PKC 2012

DOI: 10.1007/978-3-642-30057-8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7293)

Table of contents (42 papers)

  1. Front Matter
  2. Homomorphic Encryption and LWE

    1. Better Bootstrapping in Fully Homomorphic Encryption
      Craig Gentry, Shai Halevi, Nigel P. Smart
      Pages 1-16
    2. Polly Cracker, Revisited, Revisited
      Gottfried Herold
      Pages 17-33
    3. Ring-LWE in Polynomial Rings
      Léo Ducas, Alain Durmus
      Pages 34-51
    4. On Homomorphic Encryption and Chosen-Ciphertext Security
      Brett Hemenway, Rafail Ostrovsky
      Pages 52-65
  3. Signature Schemes

    1. Waters Signatures with Optimal Security Reduction
      Dennis Hofheinz, Tibor Jager, Edward Knapp
      Pages 66-83
    2. Space Efficient Signature Schemes from the RSA Assumption
      Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
      Pages 102-119
  4. Code-Based and Multivariate Crypto

  5. Public-Key Encryption: Special Properties

    1. Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
      Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
      Pages 206-224
    2. Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
      Nelly Fazio, Irippuge Milinda Perera
      Pages 225-242
    3. Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication
      Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro
      Pages 243-261
  6. Identity-Based Encryption

    1. Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
      Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee
      Pages 280-297
    2. Variants of Waters’ Dual System Primitives Using Asymmetric Pairings
      Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar
      Pages 298-315
    3. From Selective to Full Security: Semi-generic Transformations in the Standard Model
      Michel Abdalla, Dario Fiore, Vadim Lyubashevsky
      Pages 316-333

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the folllowing topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.

Keywords

cryptanalysis digital signatures embedded software oblivious transfer zero knowledge

Editors and affiliations

  • Marc Fischlin
    • 1
  • Johannes Buchmann
    • 2
  • Mark Manulis
    • 3
  1. 1.Department of Computer Science, Cryptography and Complexity TheoryDarmstadt University of TechnologyDarmstadtGermany
  2. 2.Department of Computer ScienceDarmstadt University of TechnologyDarmstadtGermany
  3. 3.Department of ComputingUniversity of SurreyGuildfordUK

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-30056-1
  • Online ISBN 978-3-642-30057-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349