PKC 2014:
Hugo Krawczyk (Ed.):
Public-Key Cryptography - PKC 2014
17th International Conference on Practice and Theory in Public-Key Cryptography
Buenos Aires, Argentina,
March 26-28, 2014
Proceedings.
PKC 2014
Argentina,
March 26-28, 2014
Preface by Hugo Krawczyk (Ed.):
Organizational Committee
Program Chairs : | Hugo Krawczyk | |
General Chair : | Ariel Waissbein | |
Steering Committee | ||
Ronald Cramer
Yvo Desmedt Hideki Imai David Naccache Tatsuaki Okamoto David Pointcheval Moti Yung (Secretary) Yuliang Zheng (Chair) |
Program Committee
Michel Abdalla |
Masayuki Abe |
Paulo S. L. M. Barreto |
Alexandra Boldyreva |
Colin Boyd |
David Cash |
Nelly Fazio |
Sanjam Garg |
S. Dov Gordon |
Jens Groth |
Nadia Heninger |
Amir Herzberg |
Alejandro Hevia |
Susan Hohenberger |
Stanislaw Jarecki |
Aggelos Kiayias |
Vladimir Kolesnikov |
Kaoru Kurosawa |
Tanja Lange |
Allison B. Lewko |
Vadim Lyubashevsky |
Mark Manulis |
Ilya Mironov |
Antonio Nicolosi |
Jesper Buus Nielsen |
Kenneth G. Paterson |
Benny Pinkas |
Elizabeth A. Quaglia |
Mariana Raykova |
Dominique Unruh |
Yevgeniy Vahlis |
Hoeteck Wee |
Daniel Wichs |
External Referees
-
Chosen Ciphertext Security
-
Simple Chosen-Ciphertext Security from Low-Noise LPN
, 1-18,
Eike Kiltz
,
Krzysztof Pietrzak
,
Daniel Masny
bib info -
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
, 19-36,
Shengli Liu
,
Baodong Qin
bib info -
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme
, 37-55,
Dana Dachman-Soled
bib info -
Chosen Ciphertext Security via UCE
, 56-76,
Goichiro Hanaoka
,
Takahiro Matsuda
bib info
-
Simple Chosen-Ciphertext Security from Low-Noise LPN
, 1-18,
Eike Kiltz
,
Krzysztof Pietrzak
,
Daniel Masny
-
Re-Encryption
-
Proxy Re-encryption from Lattices
, 77-94,
Elena Kirshanova
bib info -
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices
, 95-112,
Melissa Chase
,
Keita Xagawa
,
Nishanth Chandran
,
Feng-Hao Liu
,
Ryo Nishimaki
bib info
-
Proxy Re-encryption from Lattices
, 77-94,
Elena Kirshanova
-
Verifiable Outsourcing
-
Verifiable Set Operations over Outsourced Databases
, 113-130,
Ran Canetti
,
Nikos Triandopoulos
,
Omer Paneth
,
Dimitrios Papadopoulos
bib info -
Verifiable Oblivious Storage
, 131-148,
Jonathan Katz
,
Elaine Shi
,
Aishwarya Thiruvengadam
,
Daniel Apon
bib info -
Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing
, 149-166,
Rafail Ostrovsky
,
Vipul Goyal
,
Nishanth Chandran
,
Bhavana Kanukurthi
,
Prabhanjan Ananth
bib info -
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting
, 167-184,
David Pointcheval
,
Sébastien Canard
,
Olivier Sanders
bib info
-
Verifiable Set Operations over Outsourced Databases
, 113-130,
Ran Canetti
,
Nikos Triandopoulos
,
Omer Paneth
,
Dimitrios Papadopoulos
-
Cryptanalysis I
-
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
, 185-202,
Jean-Sébastien Coron
,
Jean-Charles Faugère
,
Phong Q. Nguyen
,
Jingguo Bi
,
Rina Zeitoun
,
Guénaël Renault
bib info -
Elliptic and Hyperelliptic Curves: A Practical Security Analysis
, 203-220,
Joppe W. Bos
,
Craig Costello
,
Andrea Miele
bib info -
Discrete Logarithm in GF(2
809
) with FFS
, 221-238,
Paul Zimmermann
,
Pierrick Gaudry
,
Emmanuel Thomé
,
Jérémie Detrey
,
Marion Videau
,
Razvan Barbulescu
,
Cyril Bouvier
,
Hamza Jeljeli
bib info
-
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences
, 185-202,
Jean-Sébastien Coron
,
Jean-Charles Faugère
,
Phong Q. Nguyen
,
Jingguo Bi
,
Rina Zeitoun
,
Guénaël Renault
-
Identity- and Attribute-Based Encryption
-
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications
, 239-256,
Benoît Libert
,
Javier Herranz
,
Carla Ràfols
,
Alex Escala
bib info -
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
, 257-274,
Stefano Tessaro
,
David A. Wilson
bib info -
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
, 275-292,
Nuttapong Attrapadung
,
Goichiro Hanaoka
,
Noboru Kunihiro
,
Shota Yamada
bib info -
Online/Offline Attribute-Based Encryption
, 293-310,
Susan Hohenberger
,
Brent Waters
bib info
-
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications
, 239-256,
Benoît Libert
,
Javier Herranz
,
Carla Ràfols
,
Alex Escala
- Enhanced Encryption
-
Signature Schemes
-
Lattice-Based Group Signature Scheme with Verifier-Local Revocation
, 345-361,
Huaxiong Wang
,
San Ling
,
Khoa Nguyen
,
Adeline Langlois
bib info -
Leakage-Resilient Signatures with Graceful Degradation
, 362-379,
Jesper Buus Nielsen
,
Daniele Venturi
,
Angela Zottarel
bib info -
On the Lossiness of the Rabin Trapdoor Function
, 380-398,
Yannick Seurin
bib info
-
Lattice-Based Group Signature Scheme with Verifier-Local Revocation
, 345-361,
Huaxiong Wang
,
San Ling
,
Khoa Nguyen
,
Adeline Langlois
-
Cryptanalysis II
-
Solving Random Subset Sum Problem by l p -norm SVP Oracle
, 399-410,
Yanbin Pan
,
Gengran Hu
,
Feng Zhang
bib info -
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice
, 411-428,
Tsuyoshi Takagi
,
Shinsaku Kiyomoto
,
Tsukasa Ishiguro
,
Yutaka Miyake
bib info -
Lazy Modulus Switching for the BKW Algorithm on LWE
, 429-445,
Jean-Charles Faugére
,
Ludovic Perret
,
Martin R. Albrecht
,
Robert Fitzpatrick
bib info -
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions
, 446-464,
Jean-Charles Faugére
,
Ludovic Perret
,
Keita Xagawa
,
Martin R. Albrecht
,
Robert Fitzpatrick
,
Yosuke Todo
bib info
-
Solving Random Subset Sum Problem by l p -norm SVP Oracle
, 399-410,
Yanbin Pan
,
Gengran Hu
,
Feng Zhang
- Related-Key Security
-
Functional Authentication
-
Functional Signatures and Pseudorandom Functions
, 501-519,
Shafi Goldwasser
,
Elette Boyle
,
Ioana Ivan
bib info -
Policy-Based Signatures
, 520-537,
Mihir Bellare
,
Georg Fuchsbauer
bib info -
Generalizing Homomorphic MACs for Arithmetic Circuits
, 538-555,
Dario Catalano
,
Rosario Gennaro
,
Dario Fiore
,
Luca Nizzardo
bib info
-
Functional Signatures and Pseudorandom Functions
, 501-519,
Shafi Goldwasser
,
Elette Boyle
,
Ioana Ivan
-
Quantum Impossibility
-
General Impossibility of Group Homomorphic Encryption in the Quantum World
, 556-573,
Frederik Armknecht
,
Stefan Katzenbeisser
,
Tommaso Gagliardoni
,
Andreas Peter
bib info -
On Minimal Assumptions for Sender-Deniable Public Key Encryption
, 574-591,
Dana Dachman-Soled
bib info -
Traceable Group Encryption
, 592-610,
Benoît Libert
,
Moti Yung
,
Marc Joye
,
Thomas Peters
bib info -
Practical Covert Authentication
, 611-629,
Stanislaw Jarecki
bib info
-
General Impossibility of Group Homomorphic Encryption in the Quantum World
, 556-573,
Frederik Armknecht
,
Stefan Katzenbeisser
,
Tommaso Gagliardoni
,
Andreas Peter
-
Protocols
-
Fine-Tuning Groth-Sahai Proofs
, 630-649,
Jens Groth
,
Alex Escala
bib info -
Cross-Domain Secure Computation
, 650-668,
Rafail Ostrovsky
,
Sanjam Garg
,
Chongwon Cho
bib info -
On the Security of the Pre-shared Key Ciphersuites of TLS
, 669-684,
Jörg Schwenk
,
Yong Li
,
Sven Schäge
,
Florian Kohlar
,
Zheng Yang
bib info
-
Fine-Tuning Groth-Sahai Proofs
, 630-649,
Jens Groth
,
Alex Escala
Author Index