PKC 2012:
Marc Fischlin (Ed.):
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography - PKC 2012,
Darmstadt,
Germany,
May 21-23, 2012
Proceedings.
PKC 2012
Germany,
May 21-23, 2012
Organizational Committee
Program Chairs : | Marc Fischlin | |
General Chairs : | Johannes Buchmann and Mark Manulis |
Program Committee
Michel Abdalla |
Alexandra Boldyreva |
Colin Boyd |
Dario Catalano |
Jean-ébastien Coron |
Georg Fuchsbauer |
Rosario Gennaro |
Dov Gordon |
Matthew Green |
Jens Groth |
Kaoru Kurosawa |
Miroslaw Kutylowski |
Vadim Lyubashevsky |
Adam O'Neill |
Christiane Peters |
Krzysztof Pietrzak |
Alon Rosen |
Dominique Schröder |
Gil Segev |
Nicolas Sendrier |
Igor E. Shparlinski |
Nigel P. Smart |
Ron Steinfeld |
Rainer Steinwandt |
Tomas Toft |
Wen-Guey Tzeng |
Ivan Visconti |
Scott Yilek |
Yuliang Zheng |
External Referees
-
Homomorphic Encryption and LWE
-
Better Bootstrapping in Fully Homomorphic Encryption
, 1-16,
Shai Halevi
,
Craig Gentry
,
Nigel P. Smart
bib info -
Polly Cracker, Revisited, Revisited
, 17-33,
Gottfried Herold
bib info -
Ring-LWE in Polynomial Rings
, 34-51,
Alain Durmus
,
Léo Ducas
bib info -
On Homomorphic Encryption and Chosen-Ciphertext Security
, 52-65,
Rafail Ostrovsky
,
Brett Hemenway
bib info
-
Better Bootstrapping in Fully Homomorphic Encryption
, 1-16,
Shai Halevi
,
Craig Gentry
,
Nigel P. Smart
-
Signature Schemes
-
Waters Signatures with Optimal Security Reduction
, 66-83,
Dennis Hofheinz
,
Tibor Jager
,
Edward Knapp
bib info -
Strong Security from Probabilistic Signature Schemes
, 84-101,
Sven Schäge
bib info -
Space Efficient Signature Schemes from the RSA Assumption
, 102-119,
Goichiro Hanaoka
,
Noboru Kunihiro
,
Shota Yamada
bib info -
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles
, 120-137,
Willy Susilo
,
Duncan S. Wong
,
Qiong Huang
bib info
-
Waters Signatures with Optimal Security Reduction
, 66-83,
Dennis Hofheinz
,
Tibor Jager
,
Edward Knapp
-
Code-Based and Multivariate Crypto
-
Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes
, 138-155,
Pierre-Louis Cayrel
,
Gerhard Hoffmann
,
Edoardo Persichetti
bib info -
Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited
, 156-171,
Christopher Wolf
,
Enrico Thomae
bib info -
Public-Key Identification Schemes Based on Multivariate Cubic Polynomials
, 172-189,
Koichi Sakumoto
bib info -
Public-Key Cryptography from New Multivariate Quadratic Assumptions
, 190-205,
Bo-Yin Yang
,
Feng-Hao Liu
,
Yun-Ju Huang
bib info
-
Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes
, 138-155,
Pierre-Louis Cayrel
,
Gerhard Hoffmann
,
Edoardo Persichetti
-
Public-Key Encryption: Special Properties
-
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
, 206-224,
Kenneth G. Paterson
,
Benoît Libert
,
Elizabeth A. Quaglia
bib info -
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
, 225-242,
Nelly Fazio
,
Irippuge Milinda Perera
bib info -
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication
, 243-261,
Nuttapong Attrapadung
,
Goichiro Hanaoka
,
Noboru Kunihiro
,
Jacob C. N. Schuldt
,
Shota Yamada
,
Bagus Santoso
bib info -
Public Key Encryption against Related Key Attacks
, 262-279,
Hoeteck Wee
bib info
-
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
, 206-224,
Kenneth G. Paterson
,
Benoît Libert
,
Elizabeth A. Quaglia
-
Identity-Based Encryption
-
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
, 280-297,
Xavier Boyen
,
Vinod Vaikuntanathan
,
Hoeteck Wee
,
Shweta Agrawal
,
Panagiotis Voulgaris
bib info -
Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract)
, 298-315,
Sanjit Chatterjee
,
Palash Sarkar
,
Somindu C. Ramanna
bib info -
From Selective to Full Security: Semi-generic Transformations in the Standard Model
, 316-333,
Michel Abdalla
,
Vadim Lyubashevsky
,
Dario Fiore
bib info -
Circular and KDM Security for Identity-Based Encryption
, 334-352,
Chris Peikert
,
Jacob Alperin-Sheriff
bib info
-
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
, 280-297,
Xavier Boyen
,
Vinod Vaikuntanathan
,
Hoeteck Wee
,
Shweta Agrawal
,
Panagiotis Voulgaris
-
Public-Key Encryption: Constructions
-
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
, 353-371,
Josef Pieprzyk
,
Huaxiong Wang
,
Ron Steinfeld
,
Christophe Tartary
,
San Ling
bib info -
Generating Provable Primes Efficiently on Embedded Devices
, 372-389,
Pascal Paillier
,
Christophe Clavier
,
Benoit Feix
,
Loïc Thierry
bib info
-
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
, 353-371,
Josef Pieprzyk
,
Huaxiong Wang
,
Ron Steinfeld
,
Christophe Tartary
,
San Ling
- Invited Talk
-
Secure Two-Party and Multi-party Computations
-
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series
, 398-412,
Jung Hee Cheon
,
Jonathan Katz
,
Jae Hong Seo
bib info -
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
, 413-430,
Dawn Song
,
Elaine Shi
,
Emil Stefanov
bib info -
Efficiently Shuffling in Public
, 431-448,
Vanessa Teague
,
Udaya Parampalli
,
Kim Ramchen
bib info
-
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series
, 398-412,
Jung Hee Cheon
,
Jonathan Katz
,
Jae Hong Seo
-
Key Exchange and Secure Sessions
-
Efficient Password Authenticated Key Exchange via Oblivious Transfer
, 449-466,
Ran Canetti
,
Vinod Vaikuntanathan
,
Hoeteck Wee
,
Dana Dachman-Soled
bib info -
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
, 467-484,
Koutarou Suzuki
,
Atsushi Fujioka
,
Keita Xagawa
,
Kazuki Yoneyama
bib info -
Relatively-Sound NIZKs and Password-Based Key-Exchange
, 485-503,
Charanjit S. Jutla
,
Arnab Roy
bib info -
Multi-location Leakage Resilient Cryptography
, 504-521,
Moti Yung
,
Yevgeniy Vahlis
,
Ali Juma
bib info
-
Efficient Password Authenticated Key Exchange via Oblivious Transfer
, 449-466,
Ran Canetti
,
Vinod Vaikuntanathan
,
Hoeteck Wee
,
Dana Dachman-Soled
-
Public-Key Encryption: Relationships
-
On Definitions of Selective Opening Security
, 522-539,
Dennis Hofheinz
,
Daniel Kraschewski
,
Florian Böhl
bib info -
New Definitions and Separations for Circular Security
, 540-557,
Matthew Green
,
Susan Hohenberger
,
David Cash
bib info -
Correlated Product Security from Any One-Way Function
, 558-575,
Rafail Ostrovsky
,
Steve Lu
,
Brett Hemenway
bib info -
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms
, 576-594,
Goichiro Hanaoka
,
Kanta Matsuura
,
Takahiro Matsuda
bib info
-
On Definitions of Selective Opening Security
, 522-539,
Dennis Hofheinz
,
Daniel Kraschewski
,
Florian Böhl
-
DL, DDH, and More Number Theory
-
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve
, 595-608,
Tetsuya Izu
,
Goichiro Hanaoka
,
Masahiko Takenaka
,
Yumi Sakemi
,
Masaya Yasuda
bib info -
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods
, 609-626,
Damien Vergnaud
,
Aurèlie Bauer
,
Jean-Christophe Zapalowicz
bib info -
Extended-DDH and Lossy Trapdoor Functions
, 627-643,
Rafail Ostrovsky
,
Brett Hemenway
bib info -
DDH-Like Assumptions Based on Extension Rings
, 644-661,
Ronald Cramer
,
Ivan Damgård
,
Eike Kiltz
,
Sarah Zakarias
,
Angela Zottarel
bib info
-
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve
, 595-608,
Tetsuya Izu
,
Goichiro Hanaoka
,
Masahiko Takenaka
,
Yumi Sakemi
,
Masaya Yasuda
-
Beyond Ordinary Signature Schemes
-
Security of Blind Signatures Revisited
, 662-679,
Dominique Unruh
,
Dominique Schröder
bib info -
Efficient Network Coding Signatures in the Standard Model
, 680-696,
Dario Catalano
,
Bogdan Warinschi
,
Dario Fiore
bib info -
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
, 697-714,
David Mandell Freeman
bib info -
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
, 715-732,
Kazuo Ohta
,
Goichiro Hanaoka
,
Jacob C. N. Schuldt
,
Yusuke Sakai
,
Keita Emura
bib info
-
Security of Blind Signatures Revisited
, 662-679,
Dominique Unruh
,
Dominique Schröder