Advertisement

Public-Key Cryptography – PKC 2017

20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II

  • Serge Fehr

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10175)

Also part of the Security and Cryptology book sub series (LNSC, volume 10175)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Encryption with Access Control

    1. Front Matter
      Pages 1-1
    2. Fabrice Benhamouda, Florian Bourse, Helger Lipmaa
      Pages 36-66
    3. Gene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich
      Pages 67-87
    4. Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi
      Pages 88-118
  3. Special Signatures

    1. Front Matter
      Pages 119-119
    2. Mihir Bellare, Bertram Poettering, Douglas Stebila
      Pages 121-151
    3. Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
      Pages 152-182
  4. Fully Homomorphic Encryption

    1. Front Matter
      Pages 211-211
    2. Ran Canetti, Srinivasan Raghuraman, Silas Richelson, Vinod Vaikuntanathan
      Pages 213-240
    3. Wutichai Chongchitmate, Rafail Ostrovsky
      Pages 241-270
    4. Daniel Benarroch, Zvika Brakerski, Tancrède Lepoint
      Pages 271-301
  5. Real-World Schemes

    1. Front Matter
      Pages 303-303
    2. Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang
      Pages 305-334
    3. Chris Brzuska, Håkon Jacobsen
      Pages 335-365
  6. Multiparty Computation

    1. Front Matter
      Pages 367-367
    2. Jesper Buus Nielsen, Samuel Ranellucci
      Pages 369-395
    3. Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam
      Pages 396-427
    4. Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
      Pages 428-460
  7. Primitives

    1. Front Matter
      Pages 461-461
    2. Dan Boneh, Kevin Lewi, David J. Wu
      Pages 494-524
    3. Venkata Koppula, Andrew Poelstra, Brent Waters
      Pages 525-554
  8. Back Matter
    Pages 555-556

Other volumes

  1. 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I
  2. Public-Key Cryptography – PKC 2017
    20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II

About these proceedings

Introduction

The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols,  Encryption Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control,  Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.

Keywords

cryptanalysis elliptic curve cryptography linear programming oblivious transfer provable security

Editors and affiliations

  • Serge Fehr
    • 1
  1. 1.CWI AmsterdamThe Netherlands

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-54388-7
  • Copyright Information International Association for Cryptologic Research 2017
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-54387-0
  • Online ISBN 978-3-662-54388-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site