© 2014

Public-Key Cryptography – PKC 2014

17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings

  • Hugo Krawczyk
Conference proceedings PKC 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8383)

Table of contents

  1. Front Matter
  2. Chosen Ciphertext Security

  3. Re-encryption

  4. Verifiable Outsourcing

    1. Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos
      Pages 113-130
    2. Daniel Apon, Jonathan Katz, Elaine Shi, Aishwarya Thiruvengadam
      Pages 131-148
    3. Prabhanjan Ananth, Nishanth Chandran, Vipul Goyal, Bhavana Kanukurthi, Rafail Ostrovsky
      Pages 149-166
    4. Sébastien Canard, David Pointcheval, Olivier Sanders
      Pages 167-184
  5. Cryptanalysis I

    1. Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun
      Pages 185-202
    2. Joppe W. Bos, Craig Costello, Andrea Miele
      Pages 203-220
    3. Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé et al.
      Pages 221-238
  6. Identity- and Attribute-Based Encryption

    1. Alex Escala, Javier Herranz, Benoît Libert, Carla Ràfols
      Pages 239-256
    2. Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
      Pages 275-292
    3. Susan Hohenberger, Brent Waters
      Pages 293-310
  7. Enhanced Encryption

    1. Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
      Pages 311-328
    2. Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O’Neill
      Pages 329-344

About these proceedings


This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.


algorithms attribute-based encryption authentication ciphertext cryptanalysis

Editors and affiliations

  • Hugo Krawczyk
    • 1
  1. 1.IBM ResearchUSA

Bibliographic information