© 2016

Public-Key Cryptography – PKC 2016

19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I

  • Chen-Mou Cheng
  • Kai-Min Chung
  • Giuseppe Persiano
  • Bo-Yin Yang
Conference proceedings

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9614)

Also part of the Security and Cryptology book sub series (LNSC, volume 9614)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. CCA Security

    1. Front Matter
      Pages 1-1
    2. Sebastian Faust, Daniel Masny, Daniele Venturi
      Pages 35-46
    3. David Bernhard, Marc Fischlin, Bogdan Warinschi
      Pages 47-69
    4. Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng
      Pages 70-98
    5. Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
      Pages 99-129
  3. Functional Encryption

    1. Front Matter
      Pages 131-131
    2. Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang
      Pages 133-163
    3. Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
      Pages 164-195
    4. Angelo De Caro, Vincenzo Iovino, Adam O’Neill
      Pages 196-222
  4. Identity-Based Encryption

    1. Front Matter
      Pages 223-223
  5. Signatures

    1. Front Matter
      Pages 281-281
    2. Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hanaoka
      Pages 283-300
    3. Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider, Dominique Schröder, Mark Simkin
      Pages 301-330
    4. Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Andy Rupp
      Pages 331-356
    5. Michael Backes, Sebastian Meiser, Dominique Schröder
      Pages 357-386
    6. Andreas Hülsing, Joost Rijneveld, Fang Song
      Pages 387-416

About these proceedings


The two-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March 2016.
The 34 revised papers presented were carefully reviewed and selected from 143 submissions. They are organized in topical sections named: CCA security, functional encryption, identity-based encryption, signatures, cryptanalysis, leakage-resilient and circularly secure encryption, protocols, and primitives.


Cryptanalysis Digital signatures Multiparty computation Post-quantum cryptography Public key encryption Algorithms Authentication Cloud storage Cryptographic primitives Cryptographic protocols Cryptography Elliptic curve cryptography Functional encryption Hash-based signatures Key management Mathematical foundations of cryptography Pairing based cryptography Privacy Simulation security Zero-knowledge arguments

Editors and affiliations

  • Chen-Mou Cheng
    • 1
  • Kai-Min Chung
    • 2
  • Giuseppe Persiano
    • 3
  • Bo-Yin Yang
    • 4
  1. 1.National Taiwan UniversityTaipeiTaiwan
  2. 2.Academia SinicaTaipeiTaiwan
  3. 3.Università di SalernoFiscianoItaly
  4. 4.Academia SinicaTaipeiTaiwan

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking