Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I /

The two-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March 2016. The 34 revised papers presented were carefully reviewed and selected from 143 s...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Cheng, Chen-Mou (Editor), Chung, Kai-Min (Editor), Persiano, Giuseppe (Editor), Yang, Bo-Yin (Editor)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2016.
Edition:1st ed. 2016.
Series:Lecture Notes in Computer Science, 9614
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Trading Plaintext-Awareness for Simulatability to Achieve Chosen Cipher Text Security
  • Chosen-Cipher Text Security from Subset Sum
  • mso-fareast-theme-font: minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:CMR10; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:AR-SA">On the Hardness of Proving CCA-Security of Signed ElGamal
  • CA-Secure Keyed-Fully Homomorphic Encryption
  • On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions
  • Extended Nested Dual System Groups, Revisited
  • Functional Encryption for Inner Product with Full Function Privacy
  • Deniable Functional Encryption
  • Identity-Based Cryptosystems and Quadratic Residuosity
  • Identity-based Hierarchical Key-insulated Encryption without Random Oracles
  • Attribute-Based Signatures for Circuits from Bilinear Map
  • Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys
  • Fault-Tolerant Aggregate Signatures
  • Delegatable Functional Signatures
  • Mitigating Multi-Target Attacks in Hash-based Signatures
  • Nearly Optimal Verifiable Data Streaming
  • ARMed SPHINCS Computing a 41 KB signature in 16 KB of RAM.