Advertisement

Public-Key Cryptography – PKC 2014

17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings

  • Hugo Krawczyk
Conference proceedings PKC 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8383)

Table of contents

  1. Front Matter
  2. Chosen Ciphertext Security

  3. Re-encryption

  4. Verifiable Outsourcing

    1. Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos
      Pages 113-130
    2. Daniel Apon, Jonathan Katz, Elaine Shi, Aishwarya Thiruvengadam
      Pages 131-148
    3. Prabhanjan Ananth, Nishanth Chandran, Vipul Goyal, Bhavana Kanukurthi, Rafail Ostrovsky
      Pages 149-166
    4. Sébastien Canard, David Pointcheval, Olivier Sanders
      Pages 167-184
  5. Cryptanalysis I

    1. Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun
      Pages 185-202
    2. Joppe W. Bos, Craig Costello, Andrea Miele
      Pages 203-220
    3. Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé et al.
      Pages 221-238
  6. Identity- and Attribute-Based Encryption

    1. Alex Escala, Javier Herranz, Benoît Libert, Carla Ràfols
      Pages 239-256
    2. Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
      Pages 275-292
    3. Susan Hohenberger, Brent Waters
      Pages 293-310
  7. Enhanced Encryption

    1. Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
      Pages 311-328
    2. Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O’Neill
      Pages 329-344
  8. Signature Schemes

    1. Adeline Langlois, San Ling, Khoa Nguyen, Huaxiong Wang
      Pages 345-361
    2. Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel
      Pages 362-379
  9. Cryptanalysis II

    1. Gengran Hu, Yanbin Pan, Feng Zhang
      Pages 399-410
    2. Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi
      Pages 411-428
    3. Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret
      Pages 429-445
    4. Martin R. Albrecht, Jean-Charles Faugére, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, Keita Xagawa
      Pages 446-464
  10. Related-Key Security

    1. Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn
      Pages 465-482
    2. Florian Böhl, Gareth T. Davies, Dennis Hofheinz
      Pages 483-500
  11. Functional Authentication

    1. Elette Boyle, Shafi Goldwasser, Ioana Ivan
      Pages 501-519
    2. Mihir Bellare, Georg Fuchsbauer
      Pages 520-537
    3. Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo
      Pages 538-555
  12. Quantum Impossibility

    1. Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter
      Pages 556-573
  13. Privacy

    1. Benoît Libert, Moti Yung, Marc Joye, Thomas Peters
      Pages 592-610
    2. Stanislaw Jarecki
      Pages 611-629
  14. Protocols

    1. Alex Escala, Jens Groth
      Pages 630-649
    2. Chongwon Cho, Sanjam Garg, Rafail Ostrovsky
      Pages 650-668
    3. Yong Li, Sven Schäge, Zheng Yang, Florian Kohlar, Jörg Schwenk
      Pages 669-684
  15. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.

Keywords

algorithms attribute-based encryption authentication ciphertext cryptanalysis

Editors and affiliations

  • Hugo Krawczyk
    • 1
  1. 1.IBM ResearchUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-54631-0
  • Copyright Information International Association for Cryptologic Research 2014 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-54630-3
  • Online ISBN 978-3-642-54631-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site