PKC 2017:
Serge Fehr (Ed.):
Public-Key Cryptography - PKC 2017
20th IACR International Conference on
Practice and Theory in Public-Key Cryptography,
Amsterdam, The Netherlands,
March 28-31, 2017,
Proceedings, Parts I and II
IACR CryptoDB for PKC 2017
Preface
by Serge Fehr (Ed.):
Organizational Committee
Program Committee
Masayuki Abe
Fabrice Benhamouda
Nir Bitansky
Zvika Brakerski
Nishanth Chandran
Dana Dachman-Soled
Nico Döttling
Léo Ducas
Sebastian Faust
Dario Fiore
Pierre-Alain Fouque
Georg Fuchsbauer
Sanjam Garg
Jens Groth
Carmit Hazay
Dennis Hofheinz
Tibor Jager
Abhishek Jain
Marcel Keller
Markulf Kohlweiss
Vadim Lyubashevsky
Takahiro Matsuda
Adam O'Neill
Arpita Patra
Ludovic Perret
Christophe Petit
Vanishree Rao
Alessandra Scafuro
Gil Segev
Fang Song
Daniele Venturi
Ivan Visconti
Hoeteck Wee
Vassilis Zikas
External Referees
Organizational Committee
General Chair
:
Program Chairs :
Program Chairs :
Serge Fehr
Mark Stevens
Mark Stevens
Program Committee
Masayuki Abe
Fabrice Benhamouda
Nir Bitansky
Zvika Brakerski
Nishanth Chandran
Dana Dachman-Soled
Nico Döttling
Léo Ducas
Sebastian Faust
Dario Fiore
Pierre-Alain Fouque
Georg Fuchsbauer
Sanjam Garg
Jens Groth
Carmit Hazay
Dennis Hofheinz
Tibor Jager
Abhishek Jain
Marcel Keller
Markulf Kohlweiss
Vadim Lyubashevsky
Takahiro Matsuda
Adam O'Neill
Arpita Patra
Ludovic Perret
Christophe Petit
Vanishree Rao
Alessandra Scafuro
Gil Segev
Fang Song
Daniele Venturi
Ivan Visconti
Hoeteck Wee
Vassilis Zikas
External Referees
- Volume 1
-
Cryptanalysis
-
LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE
, 3-15,
Alexander May
,
Gottfried Herold
bib info -
Improved Algorithms for the Approximate k-List Problem in Euclidean Norm
, 16-40,
Gottfried Herold
,
Elena Kirshanova
bib info -
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13
, 41-58,
Jean-Sébastien Coron
,
Moon Sung Lee
,
Mehdi Tibouchi
,
Tancrède Lepoint
bib info
-
LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE
, 3-15,
Alexander May
,
Gottfried Herold
-
Protocols
-
Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash
, 61-90,
David Pointcheval
,
Olivier Sanders
,
Jacques Traoré
bib info -
Asymptotically Tight Bounds for Composing ORAM with PIR
, 91-120,
Benny Pinkas
,
Ittai Abraham
,
Ling Ren
,
Christopher W. Fletcher
,
Kartik Nayak
bib info -
Predictable Arguments of Knowledge
, 121-150,
Jesper Buus Nielsen
,
Daniele Venturi
,
Antonio Faonio
bib info -
Removing Erasures with Explainable Hash Proof Systems
, 151-174,
Michel Abdalla
,
David Pointcheval
,
Fabrice Benhamouda
bib info -
Scalable Multi-party Private Set-Intersection
, 175-203,
Carmit Hazay
,
Muthuramakrishnan Venkitasubramaniam
bib info
-
Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash
, 61-90,
David Pointcheval
,
Olivier Sanders
,
Jacques Traoré
-
Encryption Schemes
-
Tightly Secure IBE Under Constant-Size Master Public Key
, 207-231,
Jian Weng
,
Jie Chen
,
Junqing Gong
bib info -
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
, 232-246,
Brent Waters
,
Venkata Koppula
,
Rishab Goyal
bib info -
Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts
, 247-276,
Benoît Libert
,
Thomas Peters
,
Chen Qian
bib info
-
Tightly Secure IBE Under Constant-Size Master Public Key
, 207-231,
Jian Weng
,
Jie Chen
,
Junqing Gong
-
Leakage-Resilient and Non-Malleable Codes
-
Non-malleable Codes with Split-State Refresh
, 279-309,
Jesper Buus Nielsen
,
Antonio Faonio
bib info -
Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes
, 310-332,
Dana Dachman-Soled
,
Aria Shahverdi
,
Mukul Kulkarni
bib info -
Fully Leakage-Resilient Codes
, 333-358,
Jesper Buus Nielsen
,
Antonio Faonio
bib info
-
Non-malleable Codes with Split-State Refresh
, 279-309,
Jesper Buus Nielsen
,
Antonio Faonio
-
Number Theory and Diffie-Hellman
-
On the Bit Security of Elliptic Curve Diffie-Hellman
, 361-387,
Barak Shani
bib info -
Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree
, 388-408,
Taechan Kim
,
Jinhyuck Jeong
bib info -
Provably Secure NTRU Instances over Prime Cyclotomic Rings
, 409-434,
Xiaoyun Wang
,
Guangwu Xu
,
Yang Yu
bib info -
Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems
, 435-464,
Jorge L. Villar
bib info
-
On the Bit Security of Elliptic Curve Diffie-Hellman
, 361-387,
Barak Shani
- Volume 2
-
Encryption with Access Control
-
Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits
, 3-35,
Nuttapong Attrapadung
bib info -
CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions
, 36-66,
Helger Lipmaa
,
Fabrice Benhamouda
,
Florian Bourse
bib info -
Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions
, 67-87,
Gene Itkis
,
Emily Shen
,
Mayank Varia
,
Arkady Yerukhimovich
,
David Wilson
bib info -
Access Control Encryption for Equality, Comparison, and More
, 88-118,
Georg Fuchsbauer
,
Claudio Orlandi
,
Romain Gay
,
Lucas Kowalczyk
bib info
-
Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits
, 3-35,
Nuttapong Attrapadung
-
Special Signatures
-
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
, 121-151,
Mihir Bellare
,
Douglas Stebila
,
Bertram Poettering
bib info -
Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures
, 152-182,
Jan Camenisch
,
Stephan Krenn
,
Daniel Slamanig
,
David Derler
,
Henrich Christopher Pöhls
,
Kai Samelin
bib info -
Improved Structure Preserving Signatures Under Standard Bilinear Assumptions
, 183-209,
Charanjit S. Jutla
,
Arnab Roy
bib info
-
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
, 121-151,
Mihir Bellare
,
Douglas Stebila
,
Bertram Poettering
-
Fully Homomorphic Encryption
-
Chosen-Ciphertext Secure Fully Homomorphic Encryption
, 213-240,
Ran Canetti
,
Vinod Vaikuntanathan
,
Silas Richelson
,
Srinivasan Raghuraman
bib info -
Circuit-Private Multi-key FHE
, 241-270,
Rafail Ostrovsky
,
Wutichai Chongchitmate
bib info -
FHE over the Integers: Decomposed and Batched in the Post-Quantum Regime
, 271-301,
Zvika Brakerski
,
Tancrède Lepoint
,
Daniel Benarroch
bib info
-
Chosen-Ciphertext Secure Fully Homomorphic Encryption
, 213-240,
Ran Canetti
,
Vinod Vaikuntanathan
,
Silas Richelson
,
Srinivasan Raghuraman
-
Real-World Schemes
-
Ceremonies for End-to-End Verifiable Elections
, 305-334,
Aggelos Kiayias
,
Bingsheng Zhang
,
Thomas Zacharias
bib info -
A Modular Security Analysis of EAP and IEEE 802.11
, 335-365,
Håkon Jacobsen
,
Chris Brzuska
bib info -
On the Computational Overhead of MPC with Dishonest Majority
, 369-395,
Jesper Buus Nielsen
,
Samuel Ranellucci
bib info -
Better Two-Round Adaptive Multi-party Computation
, 396-427,
Ran Canetti
,
Muthuramakrishnan Venkitasubramaniam
,
Oxana Poburinnaya
bib info -
Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model
, 428-460,
Carmit Hazay
,
Muthuramakrishnan Venkitasubramaniam
,
Antigoni Polychroniadou
bib info
-
Ceremonies for End-to-End Verifiable Elections
, 305-334,
Aggelos Kiayias
,
Bingsheng Zhang
,
Thomas Zacharias
-
Primitives
-
Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation
, 463-493,
Ratna Dutta
,
Sourav Mukhopadhyay
,
Pratish Datta
bib info -
Constraining Pseudorandom Functions Privately
, 494-524,
Dan Boneh
,
Kevin Lewi
,
David J. Wu
bib info -
Universal Samplers with Fast Verification
, 525-554,
Brent Waters
,
Venkata Koppula
,
Andrew Poelstra
bib info
-
Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation
, 463-493,
Ratna Dutta
,
Sourav Mukhopadhyay
,
Pratish Datta
Author Index