© 2012

Public Key Cryptography – PKC 2012

15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings

  • Marc Fischlin
  • Johannes Buchmann
  • Mark Manulis
Conference proceedings PKC 2012

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7293)

Table of contents

  1. Front Matter
  2. Homomorphic Encryption and LWE

    1. Craig Gentry, Shai Halevi, Nigel P. Smart
      Pages 1-16
    2. Gottfried Herold
      Pages 17-33
    3. Léo Ducas, Alain Durmus
      Pages 34-51
    4. Brett Hemenway, Rafail Ostrovsky
      Pages 52-65
  3. Signature Schemes

    1. Dennis Hofheinz, Tibor Jager, Edward Knapp
      Pages 66-83
    2. Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
      Pages 102-119
  4. Code-Based and Multivariate Crypto

  5. Public-Key Encryption: Special Properties

    1. Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
      Pages 206-224
    2. Nelly Fazio, Irippuge Milinda Perera
      Pages 225-242
    3. Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro
      Pages 243-261
  6. Identity-Based Encryption

    1. Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee
      Pages 280-297
    2. Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar
      Pages 298-315
    3. Michel Abdalla, Dario Fiore, Vadim Lyubashevsky
      Pages 316-333

About these proceedings


This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the folllowing topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.


cryptanalysis digital signatures embedded software oblivious transfer zero knowledge

Editors and affiliations

  • Marc Fischlin
    • 1
  • Johannes Buchmann
    • 2
  • Mark Manulis
    • 3
  1. 1.Department of Computer Science, Cryptography and Complexity TheoryDarmstadt University of TechnologyDarmstadtGermany
  2. 2.Department of Computer ScienceDarmstadt University of TechnologyDarmstadtGermany
  3. 3.Department of ComputingUniversity of SurreyGuildfordUK

Bibliographic information