default search action
14. PKC 2012: Darmstadt, Germany
- Marc Fischlin, Johannes Buchmann, Mark Manulis:
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings. Lecture Notes in Computer Science 7293, Springer 2012, ISBN 978-3-642-30056-1
Homomorphic Encryption and LWE
- Craig Gentry, Shai Halevi, Nigel P. Smart:
Better Bootstrapping in Fully Homomorphic Encryption. 1-16 - Gottfried Herold:
Polly Cracker, Revisited, Revisited. 17-33 - Léo Ducas, Alain Durmus:
Ring-LWE in Polynomial Rings. 34-51 - Brett Hemenway, Rafail Ostrovsky:
On Homomorphic Encryption and Chosen-Ciphertext Security. 52-65
Signature Schemes
- Dennis Hofheinz, Tibor Jager, Edward Knapp:
Waters Signatures with Optimal Security Reduction. 66-83 - Sven Schäge:
Strong Security from Probabilistic Signature Schemes. 84-101 - Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Space Efficient Signature Schemes from the RSA Assumption. 102-119 - Qiong Huang, Duncan S. Wong, Willy Susilo:
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles. 120-137
Code-Based and Multivariate Crypto
- Pierre-Louis Cayrel, Gerhard Hoffmann, Edoardo Persichetti:
Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes. 138-155 - Enrico Thomae, Christopher Wolf:
Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited. 156-171 - Koichi Sakumoto:
Public-Key Identification Schemes Based on Multivariate Cubic Polynomials. 172-189 - Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang:
Public-Key Cryptography from New Multivariate Quadratic Assumptions. 190-205
Public-Key Encryption: Special Properties
- Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia:
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model. 206-224 - Nelly Fazio, Irippuge Milinda Perera:
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts. 225-242 - Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro:
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication. 243-261 - Hoeteck Wee:
Public Key Encryption against Related Key Attacks. 262-279
Identity-Based Encryption
- Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee:
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices. 280-297 - Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar:
Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract). 298-315 - Michel Abdalla, Dario Fiore, Vadim Lyubashevsky:
From Selective to Full Security: Semi-generic Transformations in the Standard Model. 316-333 - Jacob Alperin-Sheriff, Chris Peikert:
Circular and KDM Security for Identity-Based Encryption. 334-352
Public-Key Encryption: Constructions
- Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary, Huaxiong Wang:
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model. 353-371 - Christophe Clavier, Benoit Feix, Loïc Thierry, Pascal Paillier:
Generating Provable Primes Efficiently on Embedded Devices. 372-389
Invited Talk
- David Pointcheval:
Password-Based Authenticated Key Exchange. 390-397
Secure Two-Party and Multi-party Computations
- Jae Hong Seo, Jung Hee Cheon, Jonathan Katz:
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series. 398-412 - Emil Stefanov, Elaine Shi, Dawn Song:
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies. 413-430 - Udaya Parampalli, Kim Ramchen, Vanessa Teague:
Efficiently Shuffling in Public. 431-448
Key Exchange and Secure Sessions
- Ran Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan, Hoeteck Wee:
Efficient Password Authenticated Key Exchange via Oblivious Transfer. 449-466 - Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama:
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices. 467-484 - Charanjit S. Jutla, Arnab Roy:
Relatively-Sound NIZKs and Password-Based Key-Exchange. 485-503 - Ali Juma, Yevgeniy Vahlis, Moti Yung:
Multi-location Leakage Resilient Cryptography. 504-521
Public-Key Encryption: Relationships
- Florian Böhl, Dennis Hofheinz, Daniel Kraschewski:
On Definitions of Selective Opening Security. 522-539 - David Cash, Matthew Green, Susan Hohenberger:
New Definitions and Separations for Circular Security. 540-557 - Brett Hemenway, Steve Lu, Rafail Ostrovsky:
Correlated Product Security from Any One-Way Function. 558-575 - Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms. 576-594
DL, DDH, and More Number Theory
- Yumi Sakemi, Goichiro Hanaoka, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda:
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve. 595-608 - Aurélie Bauer, Damien Vergnaud, Jean-Christophe Zapalowicz:
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods. 609-626 - Brett Hemenway, Rafail Ostrovsky:
Extended-DDH and Lossy Trapdoor Functions. 627-643 - Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, Angela Zottarel:
DDH-Like Assumptions Based on Extension Rings. 644-661
Beyond Ordinary Signature Schemes
- Dominique Schröder, Dominique Unruh:
Security of Blind Signatures Revisited. 662-679 - Dario Catalano, Dario Fiore, Bogdan Warinschi:
Efficient Network Coding Signatures in the Standard Model. 680-696 - David Mandell Freeman:
Improved Security for Linearly Homomorphic Signatures: A Generic Framework. 697-714 - Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta:
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking. 715-732
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.