© 2015

Public-Key Cryptography -- PKC 2015

18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings

  • Jonathan Katz
Conference proceedings PKC 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9020)

Also part of the Security and Cryptology book sub series (LNSC, volume 9020)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Public-Key Encryption

    1. Front Matter
      Pages 1-1
    2. Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
      Pages 27-51
    3. Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi
      Pages 52-73
  3. E-Cash

    1. Front Matter
      Pages 75-75
    2. Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
      Pages 77-100
    3. Foteini Baldimtsi, Melissa Chase, Georg Fuchsbauer, Markulf Kohlweiss
      Pages 101-124
  4. Cryptanalysis

    1. Front Matter
      Pages 125-125
    2. Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae
      Pages 150-174
    3. Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich, Valérie Gauthier–Umaña
      Pages 175-193
    4. Marta Conde Pena, Jean-Charles Faugère, Ludovic Perret
      Pages 194-213
  5. Digital Signatures I

    1. Front Matter
      Pages 215-215
    2. David Cash, Rafael Dowsley, Eike Kiltz
      Pages 217-235
    3. Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan
      Pages 256-279
  6. Password-Based Authentication

    1. Front Matter
      Pages 281-281
    2. Jan Camenisch, Robert R. Enderlein, Gregory Neven
      Pages 283-307
    3. Mihir Bellare, Viet Tung Hoang
      Pages 308-331

About these proceedings


This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based, predicate, and functional encryption.


Algorithms Authentication Cloud Storage Code-based Cryptography Cryptanalysis Cryptography Digital Signatures Elliptic Curve Cryptography Functional Encryption Gröbner Bases Pairing Based Cryptography Passwords Privacy Provable Security Public Key Encryption Re-encryption Security Protocols Simulation Based Security Zero-Knowledge Arguments

Editors and affiliations

  • Jonathan Katz
    • 1
  1. 1.University of MarylandCollege ParkUSA

Bibliographic information