© 2015

Public-Key Cryptography -- PKC 2015

18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings

  • Jonathan Katz
Conference proceedings PKC 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9020)

Also part of the Security and Cryptology book sub series (LNSC, volume 9020)

Table of contents

  1. Password-Based Authentication

    1. Michel Abdalla, Fabrice Benhamouda, David Pointcheval
      Pages 332-352
  2. Pairing-Based Cryptography

    1. Front Matter
      Pages 353-353
    2. Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi
      Pages 355-376
  3. Digital Signatures II

    1. Front Matter
      Pages 399-399
    2. Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang
      Pages 401-426
    3. San Ling, Khoa Nguyen, Huaxiong Wang
      Pages 427-449
    4. Benoît Libert, Marc Joye, Moti Yung, Thomas Peters
      Pages 450-473
  4. Efficient Constructions

    1. Front Matter
      Pages 475-475
    2. Ignacio Cascudo, Ivan Damgård, Bernardo David, Irene Giacomelli, Jesper Buus Nielsen, Roberto Trifiletti
      Pages 495-515
    3. Mihir Bellare, Sriram Keelveedhi
      Pages 516-538
    4. Robert Granger, Michael Scott
      Pages 539-553
  5. Cryptography with Imperfect Keys

    1. Front Matter
      Pages 555-555
    2. Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen
      Pages 557-578
    3. Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi
      Pages 579-603
  6. Interactive Proofs

    1. Front Matter
      Pages 627-627
    2. David Bernhard, Marc Fischlin, Bogdan Warinschi
      Pages 629-649
    3. Pyrros Chaidos, Jens Groth
      Pages 650-670

About these proceedings


This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based, predicate, and functional encryption.


Algorithms Authentication Cloud Storage Code-based Cryptography Cryptanalysis Cryptography Digital Signatures Elliptic Curve Cryptography Functional Encryption Gröbner Bases Pairing Based Cryptography Passwords Privacy Provable Security Public Key Encryption Re-encryption Security Protocols Simulation Based Security Zero-Knowledge Arguments

Editors and affiliations

  • Jonathan Katz
    • 1
  1. 1.University of MarylandCollege ParkUSA

Bibliographic information