Public Key Cryptography – PKC 2012

15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings

  • Marc Fischlin
  • Johannes Buchmann
  • Mark Manulis
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7293)

Table of contents

  1. Front Matter
  2. Homomorphic Encryption and LWE

    1. Craig Gentry, Shai Halevi, Nigel P. Smart
      Pages 1-16
    2. Gottfried Herold
      Pages 17-33
    3. Léo Ducas, Alain Durmus
      Pages 34-51
    4. Brett Hemenway, Rafail Ostrovsky
      Pages 52-65
  3. Signature Schemes

    1. Dennis Hofheinz, Tibor Jager, Edward Knapp
      Pages 66-83
    2. Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
      Pages 102-119
  4. Code-Based and Multivariate Crypto

  5. Public-Key Encryption: Special Properties

    1. Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
      Pages 206-224
    2. Nelly Fazio, Irippuge Milinda Perera
      Pages 225-242
    3. Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro
      Pages 243-261
  6. Identity-Based Encryption

    1. Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee
      Pages 280-297
    2. Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar
      Pages 298-315
    3. Michel Abdalla, Dario Fiore, Vadim Lyubashevsky
      Pages 316-333

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the folllowing topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.

Keywords

cryptanalysis digital signatures embedded software oblivious transfer zero knowledge

Editors and affiliations

  • Marc Fischlin
    • 1
  • Johannes Buchmann
    • 2
  • Mark Manulis
    • 3
  1. 1.Department of Computer Science, Cryptography and Complexity TheoryDarmstadt University of TechnologyDarmstadtGermany
  2. 2.Department of Computer ScienceDarmstadt University of TechnologyDarmstadtGermany
  3. 3.Department of ComputingUniversity of SurreyGuildfordUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-30057-8
  • Copyright Information International Association for Cryptologic Research 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-30056-1
  • Online ISBN 978-3-642-30057-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book