Public-Key Cryptography – PKC 2016
Springer Berlin (Verlag)
978-3-662-49383-0 (ISBN)
Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016.
The34 revised papers presented were carefully reviewed and selected from 143submissions. They are organized in topical sections named: CCA security,functional encryption, identity-based encryption, signatures, cryptanalysis,leakage-resilient and circularly secure encryption, protocols, and primitives.
Trading Plaintext-Awareness for Simulatability toAchieve Chosen Cipher Text Security.- Chosen-Cipher Text Security from SubsetSum.-mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:CMR10;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:AR-SA">Onthe Hardness of Proving CCA-Security of Signed ElGamal.- CA-Secure Keyed-FullyHomomorphic Encryption.- On the Key Dependent Message Security of theFujisaki-Okamoto Constructions.- Extended Nested Dual System Groups,Revisited.- Functional Encryption for Inner Product with Full FunctionPrivacy.- Deniable Functional Encryption.- Identity-Based Cryptosystems andQuadratic Residuosity.- Identity-based Hierarchical Key-insulated Encryptionwithout Random Oracles.- Attribute-Based Signatures for Circuits from BilinearMap.- Efficient Unlinkable Sanitizable Signatures from Signatures withRe-Randomizable Keys.- Fault-Tolerant Aggregate Signatures.- DelegatableFunctional Signatures.- Mitigating Multi-Target Attacks in Hash-basedSignatures.- Nearly Optimal Verifiable Data Streaming.- ARMed SPHINCS Computinga 41 KB signature in 16 KB of RAM.
Erscheinungsdatum | 08.10.2016 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 472 p. 46 illus. in color. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | algorithms • Applications • authentication • Cloud Storage • Computer Science • conference proceedings • Cryptanalysis • cryptographic primitives • cryptographic protocols • cryptography • data encryption • Digital Signatures • Elliptic Curve Cryptography • functional encryption • Hash-based signatures • Informatics • Key Management • mathematical foundations of cryptography • multiparty computation • pairing based cryptography • post-quantum cryptography • privacy • public key encryption • Research • Simulation security • zero-knowledge arguments |
ISBN-10 | 3-662-49383-7 / 3662493837 |
ISBN-13 | 978-3-662-49383-0 / 9783662493830 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich