default search action
22nd PKC 2019: Beijing, China
- Dongdai Lin, Kazue Sako:
Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11443, Springer 2019, ISBN 978-3-030-17258-9
Public Key Encryptions
- Rishab Goyal, Satyanarayana Vusirikala, Brent Waters:
Collusion Resistant Broadcast and Trace from Positional Witness Encryption. 3-33 - Alessandra Scafuro:
Break-glass Encryption. 34-62 - Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, Sruthi Sekar:
Registration-Based Encryption from Standard Assumptions. 63-93
Functional Encryption
- Zhedong Wang, Xiong Fan, Feng-Hao Liu:
FE for Inner Products and Its Application to Decentralized ABE. 97-127 - Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner:
Decentralizing Inner-Product Functional Encryption. 128-157 - Shuichi Katsumata, Shota Yamada:
Non-zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. 158-188 - Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna:
Function Private Predicate Encryption for Low Min-Entropy Predicates. 189-219
Obfuscation Based Cryptography
- Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Single-Key Secure Constrained PRFs for \mathrm NC^1. 223-253 - Ward Beullens, Hoeteck Wee:
Obfuscating Simple Functionalities from Knowledge Assumptions. 254-283
Re-encryption Schemes
- Aloni Cohen:
What About Bob? The Inadequacy of CPA Security for Proxy Reencryption. 287-316 - Georg Fuchsbauer, Chethan Kamath, Karen Klein, Krzysztof Pietrzak:
Adaptively Secure Proxy Re-encryption. 317-346
Fundamental Primitives (II)
- Yunhua Wen, Shengli Liu, Dawu Gu:
Generic Constructions of Robustly Reusable Fuzzy Extractor. 349-378 - Steven D. Galbraith, Jake Massimo, Kenneth G. Paterson:
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. 379-407 - Lisa Kohl:
Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs. 408-437
Post Quantum Cryptography
- Shuichi Katsumata, Takahiro Matsuda, Atsushi Takayasu:
Lattice-Based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance. 441-471 - Ron D. Rothblum, Adam Sealfon, Katerina Sotiraki:
Towards Non-Interactive Zero-Knowledge for NP from LWE. 472-503 - Thomas Pornin, Thomas Prest:
More Efficient Algorithms for the NTRU Key Generation Using the Field Norm. 504-533 - Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu:
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto. 534-564 - Jan-Pieter D'Anvers, Qian Guo, Thomas Johansson, Alexander Nilsson, Frederik Vercauteren, Ingrid Verbauwhede:
Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes. 565-598 - Zhe Li, Chaoping Xing, Sze Ling Yeo:
Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations. 599-617 - Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. 618-645 - Simon-Philipp Merz, Christophe Petit:
Factoring Products of Braids via Garside Normal Form. 646-678
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.