© 2016

Public-Key Cryptography – PKC 2016

19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II

  • Chen-Mou Cheng
  • Kai-Min Chung
  • Giuseppe Persiano
  • Bo-Yin Yang
Conference proceedings PKC 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9615)

Also part of the Security and Cryptology book sub series (LNSC, volume 9615)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Cryptanalysis

    1. Front Matter
      Pages 1-1
    2. Christophe Petit, Michiel Kosters, Ange Messeng
      Pages 3-18
    3. Samuel Neves, Mehdi Tibouchi
      Pages 19-35
    4. Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud
      Pages 36-66
    5. Atsushi Takayasu, Noboru Kunihiro
      Pages 67-97
  3. Leakage-Resilient and Circularly Secure Encryption

    1. Front Matter
      Pages 99-99
    2. Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O’Neill, Hong-Sheng Zhou
      Pages 101-128
    3. Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan
      Pages 129-158
  4. Protocols

    1. Front Matter
      Pages 181-181
    2. Ivan Damgård, Antigoni Polychroniadou, Vanishree Rao
      Pages 208-233
    3. Jan Camenisch, Manu Drijvers, Anja Lehmann
      Pages 234-264
    4. Ran Canetti, Daniel Shahaf, Margarita Vald
      Pages 265-296
    5. Allison Bishop, Valerio Pastro
      Pages 327-356
  5. Primitives

    1. Front Matter
      Pages 357-357
    2. Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy
      Pages 359-385
    3. Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow
      Pages 386-416

About these proceedings


The two-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19th IACR  International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March 2016.
The 34 revised papers presented were carefully reviewed and selected from 143 submissions. They are organized in topical sections named: CCA security, functional encryption, identity-based encryption, signatures, cryptanalysis, leakage-resilient and circularly secure encryption, protocols, and primitives.


Cryptanalysis Digital signatures Multiparty computation Post-quantum cryptography Public key encryption Algorithms Authentication Cloud storage Cryptographic primitives Cryptographic protocols Cryptography Elliptic curve cryptography Functional encryption Hash-based signatures Key management Mathematical foundations of cryptography Pairing based cryptography Privacy Simulation security Zero-knowledge arguments

Editors and affiliations

  • Chen-Mou Cheng
    • 1
  • Kai-Min Chung
    • 2
  • Giuseppe Persiano
    • 3
  • Bo-Yin Yang
    • 4
  1. 1.National Taiwan UniversityTaipeiTaiwan
  2. 2.Academia SinicaTaipeiTaiwan
  3. 3.Università di SalernoFiscianoItaly
  4. 4.Academia SinicaTaipeiTaiwan

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking