Public-Key Cryptography -- PKC 2015

18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings

  • Jonathan Katz
Conference proceedings PKC 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9020)

Also part of the Security and Cryptology book sub series (LNSC, volume 9020)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Public-Key Encryption

    1. Front Matter
      Pages 1-1
    2. Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
      Pages 27-51
    3. Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi
      Pages 52-73
  3. E-Cash

    1. Front Matter
      Pages 75-75
    2. Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
      Pages 77-100
    3. Foteini Baldimtsi, Melissa Chase, Georg Fuchsbauer, Markulf Kohlweiss
      Pages 101-124
  4. Cryptanalysis

    1. Front Matter
      Pages 125-125
    2. Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae
      Pages 150-174
    3. Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich, Valérie Gauthier–Umaña
      Pages 175-193
    4. Marta Conde Pena, Jean-Charles Faugère, Ludovic Perret
      Pages 194-213
  5. Digital Signatures I

    1. Front Matter
      Pages 215-215
    2. David Cash, Rafael Dowsley, Eike Kiltz
      Pages 217-235
    3. Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan
      Pages 256-279
  6. Password-Based Authentication

    1. Front Matter
      Pages 281-281
    2. Jan Camenisch, Robert R. Enderlein, Gregory Neven
      Pages 283-307
    3. Mihir Bellare, Viet Tung Hoang
      Pages 308-331
    4. Michel Abdalla, Fabrice Benhamouda, David Pointcheval
      Pages 332-352
  7. Pairing-Based Cryptography

    1. Front Matter
      Pages 353-353
    2. Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi
      Pages 355-376
  8. Digital Signatures II

    1. Front Matter
      Pages 399-399
    2. Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang
      Pages 401-426
    3. San Ling, Khoa Nguyen, Huaxiong Wang
      Pages 427-449
    4. Benoît Libert, Marc Joye, Moti Yung, Thomas Peters
      Pages 450-473
  9. Efficient Constructions

    1. Front Matter
      Pages 475-475
    2. Ignacio Cascudo, Ivan Damgård, Bernardo David, Irene Giacomelli, Jesper Buus Nielsen, Roberto Trifiletti
      Pages 495-515
    3. Mihir Bellare, Sriram Keelveedhi
      Pages 516-538
    4. Robert Granger, Michael Scott
      Pages 539-553
  10. Cryptography with Imperfect Keys

    1. Front Matter
      Pages 555-555
    2. Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen
      Pages 557-578
    3. Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi
      Pages 579-603
  11. Interactive Proofs

    1. Front Matter
      Pages 627-627
    2. David Bernhard, Marc Fischlin, Bogdan Warinschi
      Pages 629-649
    3. Pyrros Chaidos, Jens Groth
      Pages 650-670
  12. Lattice-Based Cryptography

    1. Front Matter
      Pages 671-671
    2. Emmanuela Orsini, Joop van de Pol, Nigel P. Smart
      Pages 673-698
    3. Ryo Hiromasa, Masayuki Abe, Tatsuaki Okamoto
      Pages 699-715
    4. Vadim Lyubashevsky, Daniel Wichs
      Pages 716-730
  13. Identity-Based, Predicate, and Functional Encryption

    1. Front Matter
      Pages 731-731
    2. Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval
      Pages 733-751
    3. Romain Gay, Pierrick Méaux, Hoeteck Wee
      Pages 752-776
    4. Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai
      Pages 777-798
  14. Back Matter
    Pages 823-824

About these proceedings


This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based, predicate, and functional encryption.


Algorithms Authentication Cloud Storage Code-based Cryptography Cryptanalysis Cryptography Digital Signatures Elliptic Curve Cryptography Functional Encryption Gröbner Bases Pairing Based Cryptography Passwords Privacy Provable Security Public Key Encryption Re-encryption Security Protocols Simulation Based Security Zero-Knowledge Arguments

Editors and affiliations

  • Jonathan Katz
    • 1
  1. 1.University of MarylandCollege ParkUSA

Bibliographic information

  • DOI
  • Copyright Information International Association for Cryptologic Research 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-662-46446-5
  • Online ISBN 978-3-662-46447-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software