Public-Key Cryptography – PKC 2013

16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings

  • Kaoru Kurosawa
  • Goichiro Hanaoka
Conference proceedings

DOI: 10.1007/978-3-642-36362-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7778)

Table of contents (30 papers)

  1. Front Matter
  2. Homomorphic Encryption

    1. Packed Ciphertexts in LWE-Based Homomorphic Encryption
      Zvika Brakerski, Craig Gentry, Shai Halevi
      Pages 1-13
    2. Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
      Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou
      Pages 14-31
    3. Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
      Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda, Shota Yamada
      Pages 32-50
  3. Invited Talk (1)

  4. Primitives

    1. Vector Commitments and Their Applications
      Dario Catalano, Dario Fiore
      Pages 55-72
    2. Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
      Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou
      Pages 73-88
    3. Cryptography Using Captcha Puzzles
      Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia
      Pages 89-106
    4. Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications
      San Ling, Khoa Nguyen, Damien Stehlé, Huaxiong Wang
      Pages 107-124
  5. Functional Encryption/Signatures

    1. Decentralized Attribute-Based Signatures
      Tatsuaki Okamoto, Katsuyuki Takashima
      Pages 125-142
    2. On the Semantic Security of Functional Encryption Schemes
      Manuel Barbosa, Pooya Farshim
      Pages 143-161
    3. Attribute-Based Encryption with Fast Decryption
      Susan Hohenberger, Brent Waters
      Pages 162-179
  6. On RSA

    1. Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
      Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu
      Pages 180-197
    2. Combined Attack on CRT-RSA
      Guillaume Barbu, Alberto Battistello, Guillaume Dabosville, Christophe Giraud, Guénaël Renault, Soline Renner et al.
      Pages 198-215
  7. IBE and IPE

  8. Invited Talk (2)

  9. Key Exchange

    1. Non-Interactive Key Exchange
      Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson
      Pages 254-271
    2. Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
      Fabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud
      Pages 272-291
  10. Signature Schemes I

    1. Tighter Reductions for Forward-Secure Signature Schemes
      Michel Abdalla, Fabrice Ben Hamouda, David Pointcheval
      Pages 292-311

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013.
The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols.

Keywords

cryptography digital signatures fast decryption public-key encryption security

Editors and affiliations

  • Kaoru Kurosawa
    • 1
  • Goichiro Hanaoka
    • 2
  1. 1.Department of Computer and Information SciencesIbaraki UniversityHitachiJapan
  2. 2.Research Institute for Secure Systems (RISEC)National Institute of Advanced Industrial Science and Technology (AIST)TsukubaJapan

Bibliographic information

  • Copyright Information © International Association for Cryptologic Research 2013 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-36361-0
  • Online ISBN 978-3-642-36362-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349