Public-Key Cryptography  PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26  March 1, 2013. Proceedings /

This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submi...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Kurosawa, Kaoru. (Editor), Hanaoka, Goichiro. (Editor)
Format: Electronic
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
Series:Lecture Notes in Computer Science, 7778
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-36362-7
LEADER 06612nam a22005415i 4500
001 15579
003 DE-He213
005 20130727075307.0
007 cr nn 008mamaa
008 130217s2013 gw | s |||| 0|eng d
020 # # |a 9783642363627  |9 978-3-642-36362-7 
024 7 # |a 10.1007/978-3-642-36362-7  |2 doi 
050 # 4 |a QA76.9.A25 
072 # 7 |a URY  |2 bicssc 
072 # 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.82  |2 23 
100 1 # |a Kurosawa, Kaoru.  |e editor. 
245 1 0 |a Public-Key Cryptography PKC 2013  |b 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 March 1, 2013. Proceedings /  |c edited by Kaoru Kurosawa, Goichiro Hanaoka.  |h [electronic resource] : 
264 # 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2013. 
300 # # |a XIV, 518 p. 46 illus.  |b online resource. 
336 # # |a text  |b txt  |2 rdacontent 
337 # # |a computer  |b c  |2 rdamedia 
338 # # |a online resource  |b cr  |2 rdacarrier 
347 # # |a text file  |b PDF  |2 rda 
490 1 # |a Lecture Notes in Computer Science,  |v 7778  |x 0302-9743 ; 
505 0 # |a Packed Ciphertexts in LWE-Based Homomorphic Encryption.-�Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.-�Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.-�Functional Encryption: Origins and Recent Developments.-�Vector Commitments and Their Applications.-�Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.-�Cryptography Using Captcha Puzzles.-�Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.-�Decentralized Attribute-Based Signatures.-�On the Semantic Security of Functional Encryption Schemes.-�Attribute-Based Encryption with Fast Decryption.-�Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.-�Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.-�Revocable Identity-Based Encryption Revisited: Security Model and Construction.-�Improved (Hierarchical) Inner-Product Encryption from Lattices.-�Techniques for Efficient Secure Computation Based on Yao s Protocol.-�Non-Interactive Key Exchange.-�Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.-�Tighter Reductions for Forward-Secure Signature Schemes.-�Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.-�Robust Encryption, Revisited.-�Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.-�Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.-�Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.-�New Constructions and Applications of Trapdoor DDH Groups.-�Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.-�On the Connection between Leakage Tolerance and Adaptive Security. Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.-�Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.-�Functional Encryption: Origins and Recent Developments.-�Vector Commitments and Their Applications.-�Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.-�Cryptography Using Captcha Puzzles.-�Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.-�Decentralized Attribute-Based Signatures.-�On the Semantic Security of Functional Encryption Schemes.-�Attribute-Based Encryption with Fast Decryption.-�Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.-�Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.-�Revocable Identity-Based Encryption Revisited: Security Model and Construction.-�Improved (Hierarchical) Inner-Product Encryption from Lattices.-�Techniques for Efficient Secure Computation Based on Yao s Protocol.-�Non-Interactive Key Exchange.-�Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.-�Tighter Reductions for Forward-Secure Signature Schemes.-�Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.-�Robust Encryption, Revisited.-�Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.-�Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.-�Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.-�New Constructions and Applications of Trapdoor DDH Groups.-�Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.-�On the Connection between Leakage Tolerance and Adaptive Security. 
520 # # |a This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols. 
650 # 0 |a Computer science. 
650 # 0 |a Data protection. 
650 # 0 |a Data encryption (Computer science). 
650 # 0 |a Coding theory. 
650 # 0 |a Information systems. 
650 1 4 |a Computer Science. 
650 2 4 |a Data Encryption. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Coding and Information Theory. 
650 2 4 |a e-Commerce/e-business. 
650 2 4 |a Computer Appl. in Administrative Data Processing. 
700 1 # |a Hanaoka, Goichiro.  |e editor. 
710 2 # |a SpringerLink (Online service) 
773 0 # |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642363610 
830 # 0 |a Lecture Notes in Computer Science,  |v 7778  |x 0302-9743 ; 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-36362-7 
912 # # |a ZDB-2-SCS 
912 # # |a ZDB-2-LNC 
950 # # |a Computer Science (Springer-11645)