PKC 2016:
Giuseppe Persiano and Bo-Yin Yang(Eds.):
Public-Key Cryptography - PKC 2016
19th IACR International Conference on Practice and Theory in Public-Key Cryptography,
Taipei, Taiwan,
March 6-9, 2016, Proceedings
Proceedings.
PKC 2016, Part I
PKC 2016, Part II
Taiwan,
March 6-9, 2016, Proceedings, Part II
Organizational Committee
Program Chairs : | Giuseppe Persiano | Bo-Yin Yang | ||
General Chairs : | Kai-Min Chung and Chen-Mou Cheng |
Program Committee
Joël Alwen |
Paulo S. L. M. Barreto |
Carlo Blundo |
Dario Catalano |
Melissa Chase |
Tung Chou |
Emiliano De Cristofaro |
Dana Dachman-Soled |
Yvo Desmedt |
Leo Ducas |
Dario Fiore |
Pierre-Alain Fouque |
Sanjam Garg |
Tim Güneysu |
Yuval Ishai |
Tanja Lange |
Benoît Libert |
Feng-Hao Liu |
Hemanta K. Maji |
Alexander May |
Phong Q. Nguyen |
Jesper Buus Nielsen |
Tatsuaki Okamoto |
Rafail Ostrovsky |
Omkant Pandey |
Christophe Petit |
David Pointcheval |
Ahmad-Reza Sadeghi |
Dominique Schröder |
Peter Schwabe |
Daniel Smith-Tone |
Damien Stehlé |
Mehdi Tibouchi |
Wen-Guey Tzeng |
Daniele Venturi |
Bo-Yin Yang |
Moti Yung |
External Referees
-
CCA Security
-
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security
, 3-34,
Goichiro Hanaoka
,
Takahiro Matsuda
bib info -
Chosen-Ciphertext Security from Subset Sum
, 35-46,
Sebastian Faust
,
Daniele Venturi
,
Daniel Masny
bib info -
On the Hardness of Proving CCA-Security of Signed ElGamal
, 47-69,
Marc Fischlin
,
Bogdan Warinschi
,
David Bernhard
bib info -
CCA-Secure Keyed-Fully Homomorphic Encryption
, 70-98,
Kouichi Sakurai
,
Robert H. Deng
,
Junzuo Lai
,
Changshe Ma
,
Jian Weng
bib info -
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions
, 99-129,
Goichiro Hanaoka
,
Keisuke Tanaka
,
Takahiro Matsuda
,
Fuyuki Kitagawa
bib info
-
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security
, 3-34,
Goichiro Hanaoka
,
Takahiro Matsuda
-
Functional Encryption
-
Extended Nested Dual System Groups, Revisited
, 133-163,
Zhenfu Cao
,
Xiaolei Dong
,
Jie Chen
,
Junqing Gong
,
Shaohua Tang
bib info -
Functional Encryption for Inner Product with Full Function Privacy
, 164-195,
Ratna Dutta
,
Sourav Mukhopadhyay
,
Pratish Datta
bib info -
Deniable Functional Encryption
, 196-222,
Adam O'Neill
,
Angelo De Caro
,
Vincenzo Iovino
bib info
-
Extended Nested Dual System Groups, Revisited
, 133-163,
Zhenfu Cao
,
Xiaolei Dong
,
Jie Chen
,
Junqing Gong
,
Shaohua Tang
- Identity-Based Encryption
-
Identity-Based Cryptosystems and Quadratic Residuosity
, 225-254,
Marc Joye
bib info -
Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
, 255-279,
Junji Shikata
,
Yohei Watanabe
bib info - Signatures
-
Attribute-Based Signatures for Circuits from Bilinear Map
, 283-300,
Nuttapong Attrapadung
,
Goichiro Hanaoka
,
Yusuke Sakai
bib info -
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys
, 301-330,
Dominique Schröder
,
Nils Fleischhacker
,
Jonas Schneider
,
Johannes Krupp
,
Giulio Malavolta
,
Mark Simkin
bib info -
Fault-Tolerant Aggregate Signatures
, 331-356,
Andy Rupp
,
Jessica Koch
,
Alexander Koch
,
Gunnar Hartung
,
Björn Kaidel
bib info -
Delegatable Functional Signatures
, 357-386,
Michael Backes
,
Dominique Schröder
,
Sebastian Meiser
bib info -
Mitigating Multi-target Attacks in Hash-Based Signatures
, 387-416,
Fang Song
,
Andreas Hülsing
,
Joost Rijneveld
bib info -
Nearly Optimal Verifiable Data Streaming
, 417-445,
Giuseppe Ateniese
,
Dario Fiore
,
Dominique Schröder
,
Johannes Krupp
,
Mark Simkin
,
Stefan Nürnberger
bib info -
ARMed SPHINCS - Computing a 41 KB Signature in 16 KB of RAM
, 446-470,
Peter Schwabe
,
Andreas Hülsing
,
Joost Rijneveld
bib info - Cryptanalysis
-
Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields
, 3-18,
Christophe Petit
,
Michiel Kosters
,
Ange Messeng
bib info -
Degenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards Curves and Other Models
, 19-35,
Mehdi Tibouchi
,
Samuel Neves
bib info -
Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness
, 36-66,
Damien Vergnaud
,
Céline Chevalier
,
Adrian Thillard
,
Fabrice Benhamouda
bib info -
How to Generalize RSA Cryptanalyses
, 67-97,
Noboru Kunihiro
,
Atsushi Takayasu
bib info - Leakage-Resilient and Circularly Secure Encryption
-
Leakage-Resilient Public-Key Encryption from Obfuscation
, 101-128,
Adam O'Neill
,
Hong-Sheng Zhou
,
S. Dov Gordon
,
Dana Dachman-Soled
,
Feng-Hao Liu
bib info -
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
, 129-158,
Mohammad Hajiabadi
,
Bruce M. Kapron
,
Venkatesh Srinivasan
bib info -
KDM-Security via Homomorphic Smooth Projective Hashing
, 159-179,
Hoeteck Wee
bib info - Protocols
-
Asynchronous Secure Multiparty Computation in Constant Time
, 183-207,
Ran Cohen
bib info -
Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE)
, 208-233,
Ivan Damgård
,
Vanishree Rao
,
Antigoni Polychroniadou
bib info -
Copyright form for
Universally Composable Direct Anonymous Attestation
(paper is missing), 234-264,
Jan Camenisch
,
Anja Lehmann
,
Manu Drijvers
bib info -
Universally Composable Authentication and Key-Exchange with Global PKI
, 265-296,
Ran Canetti
,
Margarita Vald
,
Daniel Shahaf
bib info -
Very-Efficient Simulatable Flipping of Many Coins into a Well - (and a New Universally-Composable Commitment Scheme)
, 297-326,
Luís T. A. N. Brandão
bib info -
Robust Secret Sharing Schemes Against Local Adversaries
, 327-356,
Valerio Pastro
,
Allison Bishop
bib info - Primitives
-
Reducing Depth in Constrained PRFs: From Bit-Fixing to NC
1/A
, 359-385,
Nishanth Chandran
,
Dhinakaran Vinayagamurthy
,
Srinivasan Raghuraman
bib info -
Non-Malleable Functions and Their Applications
, 386-416,
Jiang Zhang
,
Yi Deng
,
Sherman S. M. Chow
,
Yu Chen
,
Baodong Qin
bib info -
On Public Key Encryption from Noisy Codewords
, 417-446,
Ivan Damgård
,
Yuval Ishai
,
Eli Ben-Sasson
,
Iddo Bentov
,
Noga Ron-Zewi
bib info -
Indistinguishability Obfuscation with Non-trivial Efficiency
(paper not available), 447-462,
Huijia Lin
,
Rafael Pass
,
Karn Seth
, and
Sidharth Telang
bib info
Author Index