Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Public-Key Cryptography – PKC 2016

19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I
Buch | Softcover
XIV, 472 Seiten
2016 | 1st ed. 2016
Springer Berlin (Verlag)
978-3-662-49383-0 (ISBN)

Lese- und Medienproben

Public-Key Cryptography – PKC 2016 -
CHF 74,85 inkl. MwSt

Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016.
The34 revised papers presented were carefully reviewed and selected from 143submissions. They are organized in topical sections named: CCA security,functional encryption, identity-based encryption, signatures, cryptanalysis,leakage-resilient and circularly secure encryption, protocols, and primitives.

Trading Plaintext-Awareness for Simulatability toAchieve Chosen Cipher Text Security.- Chosen-Cipher Text Security from SubsetSum.-mso-fareast-theme-font:minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:CMR10;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:AR-SA">Onthe Hardness of Proving CCA-Security of Signed ElGamal.- CA-Secure Keyed-FullyHomomorphic Encryption.- On the Key Dependent Message Security of theFujisaki-Okamoto Constructions.- Extended Nested Dual System Groups,Revisited.- Functional Encryption for Inner Product with Full FunctionPrivacy.- Deniable Functional Encryption.- Identity-Based Cryptosystems andQuadratic Residuosity.- Identity-based Hierarchical Key-insulated Encryptionwithout Random Oracles.- Attribute-Based Signatures for Circuits from BilinearMap.- Efficient Unlinkable Sanitizable Signatures from Signatures withRe-Randomizable Keys.- Fault-Tolerant Aggregate Signatures.- DelegatableFunctional Signatures.- Mitigating Multi-Target Attacks in Hash-basedSignatures.- Nearly Optimal Verifiable Data Streaming.- ARMed SPHINCS Computinga 41 KB signature in 16 KB of RAM.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XIV, 472 p. 46 illus. in color.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte algorithms • Applications • authentication • Cloud Storage • Computer Science • conference proceedings • Cryptanalysis • cryptographic primitives • cryptographic protocols • cryptography • data encryption • Digital Signatures • Elliptic Curve Cryptography • functional encryption • Hash-based signatures • Informatics • Key Management • mathematical foundations of cryptography • multiparty computation • pairing based cryptography • post-quantum cryptography • privacy • public key encryption • Research • Simulation security • zero-knowledge arguments
ISBN-10 3-662-49383-7 / 3662493837
ISBN-13 978-3-662-49383-0 / 9783662493830
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich