Advertisement

Public Key Cryptography – PKC 2012

15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings

  • Marc Fischlin
  • Johannes Buchmann
  • Mark Manulis

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7293)

Table of contents

  1. Front Matter
  2. Homomorphic Encryption and LWE

    1. Craig Gentry, Shai Halevi, Nigel P. Smart
      Pages 1-16
    2. Gottfried Herold
      Pages 17-33
    3. Léo Ducas, Alain Durmus
      Pages 34-51
    4. Brett Hemenway, Rafail Ostrovsky
      Pages 52-65
  3. Signature Schemes

    1. Dennis Hofheinz, Tibor Jager, Edward Knapp
      Pages 66-83
    2. Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
      Pages 102-119
  4. Code-Based and Multivariate Crypto

  5. Public-Key Encryption: Special Properties

    1. Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
      Pages 206-224
    2. Nelly Fazio, Irippuge Milinda Perera
      Pages 225-242
    3. Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro
      Pages 243-261
  6. Identity-Based Encryption

    1. Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee
      Pages 280-297
    2. Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar
      Pages 298-315
    3. Michel Abdalla, Dario Fiore, Vadim Lyubashevsky
      Pages 316-333
    4. Jacob Alperin-Sheriff, Chris Peikert
      Pages 334-352
  7. Public-Key Encryption: Constructions

    1. Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary, Huaxiong Wang
      Pages 353-371
    2. Christophe Clavier, Benoit Feix, Loïc Thierry, Pascal Paillier
      Pages 372-389
  8. Invited Talk

    1. David Pointcheval
      Pages 390-397
  9. Secure Two-Party and Multi-party Computations

    1. Jae Hong Seo, Jung Hee Cheon, Jonathan Katz
      Pages 398-412
    2. Udaya Parampalli, Kim Ramchen, Vanessa Teague
      Pages 431-448
  10. Key Exchange and Secure Sessions

    1. Ran Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan, Hoeteck Wee
      Pages 449-466
    2. Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama
      Pages 467-484
    3. Charanjit Jutla, Arnab Roy
      Pages 485-503
    4. Ali Juma, Yevgeniy Vahlis, Moti Yung
      Pages 504-521
  11. Public-Key Encryption: Relationships

    1. Florian Böhl, Dennis Hofheinz, Daniel Kraschewski
      Pages 522-539
    2. David Cash, Matthew Green, Susan Hohenberger
      Pages 540-557
    3. Brett Hemenway, Steve Lu, Rafail Ostrovsky
      Pages 558-575
  12. DL, DDH, and More Number Theory

    1. Yumi Sakemi, Goichiro Hanaoka, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda
      Pages 595-608
    2. Aurélie Bauer, Damien Vergnaud, Jean-Christophe Zapalowicz
      Pages 609-626
    3. Brett Hemenway, Rafail Ostrovsky
      Pages 627-643
    4. Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, Angela Zottarel
      Pages 644-661
  13. Beyond Ordinary Signature Schemes

    1. Dominique Schröder, Dominique Unruh
      Pages 662-679
    2. Dario Catalano, Dario Fiore, Bogdan Warinschi
      Pages 680-696
    3. Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta
      Pages 715-732
  14. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the folllowing topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.

Keywords

cryptanalysis digital signatures embedded software oblivious transfer zero knowledge

Editors and affiliations

  • Marc Fischlin
    • 1
  • Johannes Buchmann
    • 2
  • Mark Manulis
    • 3
  1. 1.Department of Computer Science, Cryptography and Complexity TheoryDarmstadt University of TechnologyDarmstadtGermany
  2. 2.Department of Computer ScienceDarmstadt University of TechnologyDarmstadtGermany
  3. 3.Department of ComputingUniversity of SurreyGuildfordUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-30057-8
  • Copyright Information International Association for Cryptologic Research 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-30056-1
  • Online ISBN 978-3-642-30057-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace