What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from PKC 2012
Year
Venue
Title
2012
PKC
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
Benoît Libert
Kenneth G. Paterson
Elizabeth A. Quaglia
2012
PKC
Better Bootstrapping in Fully Homomorphic Encryption
Craig Gentry
Shai Halevi
Nigel P. Smart
2012
PKC
Circular and KDM Security for Identity-Based Encryption
Jacob Alperin-Sheriff
Chris Peikert
2012
PKC
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series
Jae Hong Seo
Jung Hee Cheon
Jonathan Katz
2012
PKC
Correlated Product Security from Any One-Way Function
Brett Hemenway
Steve Lu
Rafail Ostrovsky
2012
PKC
DDH-Like Assumptions Based on Extension Rings
Ronald Cramer
Ivan Damgård
Eike Kiltz
Sarah Zakarias
Angela Zottarel
2012
PKC
Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes
Pierre-Louis Cayrel
Gerhard Hoffmann
Edoardo Persichetti
2012
PKC
Efficient Network Coding Signatures in the Standard Model
Dario Catalano
Dario Fiore
Bogdan Warinschi
2012
PKC
Efficient Password Authenticated Key Exchange via Oblivious Transfer
Ran Canetti
Dana Dachman-Soled
Vinod Vaikuntanathan
Hoeteck Wee
2012
PKC
Efficiently Shuffling in Public
Udaya Parampalli
Kim Ramchen
Vanessa Teague
2012
PKC
Extended-DDH and Lossy Trapdoor Functions
Brett Hemenway
Rafail Ostrovsky
2012
PKC
From Selective to Full Security: Semi-generic Transformations in the Standard Model
Michel Abdalla
Dario Fiore
Vadim Lyubashevsky
2012
PKC
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
Shweta Agrawal
Xavier Boyen
Vinod Vaikuntanathan
Panagiotis Voulgaris
Hoeteck Wee
2012
PKC
Generating Provable Primes Efficiently on Embedded Devices
Christophe Clavier
Benoit Feix
Loïc Thierry
Pascal Paillier
2012
PKC
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
David Mandell Freeman
2012
PKC
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods
Aurélie Bauer
Damien Vergnaud
Jean-Christophe Zapalowicz
2012
PKC
Multi-location Leakage Resilient Cryptography
Ali Juma
Yevgeniy Vahlis
Moti Yung
2012
PKC
New Definitions and Separations for Circular Security
David Cash
Matthew Green
Susan Hohenberger
2012
PKC
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
Ron Steinfeld
San Ling
Josef Pieprzyk
Christophe Tartary
Huaxiong Wang
2012
PKC
On Definitions of Selective Opening Security
Florian Böhl
Dennis Hofheinz
Daniel Kraschewski
2012
PKC
On Homomorphic Encryption and Chosen-Ciphertext Security
Brett Hemenway
Rafail Ostrovsky
2012
PKC
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
Yusuke Sakai
Jacob C. N. Schuldt
Keita Emura
Goichiro Hanaoka
Kazuo Ohta
2012
PKC
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
Nelly Fazio
Irippuge Milinda Perera
2012
PKC
Password-Based Authenticated Key Exchange
★
Invited paper
David Pointcheval
2012
PKC
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Emil Stefanov
Elaine Shi
Dawn Song
2012
PKC
Polly Cracker, Revisited, Revisited
Gottfried Herold
2012
PKC
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings
2012
PKC
Public Key Encryption against Related Key Attacks
Hoeteck Wee
2012
PKC
Public-Key Cryptography from New Multivariate Quadratic Assumptions
Yun-Ju Huang
Feng-Hao Liu
Bo-Yin Yang
2012
PKC
Public-Key Identification Schemes Based on Multivariate Cubic Polynomials
Koichi Sakumoto
2012
PKC
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms
Takahiro Matsuda
Goichiro Hanaoka
Kanta Matsuura
2012
PKC
Relatively-Sound NIZKs and Password-Based Key-Exchange
Charanjit S. Jutla
Arnab Roy
2012
PKC
Ring-LWE in Polynomial Rings
Léo Ducas
Alain Durmus
2012
PKC
Security of Blind Signatures Revisited
Dominique Schröder
Dominique Unruh
2012
PKC
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve
Yumi Sakemi
Goichiro Hanaoka
Tetsuya Izu
Masahiko Takenaka
Masaya Yasuda
2012
PKC
Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited
Enrico Thomae
Christopher Wolf
2012
PKC
Space Efficient Signature Schemes from the RSA Assumption
Shota Yamada
Goichiro Hanaoka
Noboru Kunihiro
2012
PKC
Strong Security from Probabilistic Signature Schemes
Sven Schäge
2012
PKC
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Atsushi Fujioka
Koutarou Suzuki
Keita Xagawa
Kazuki Yoneyama
2012
PKC
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles
Qiong Huang
Duncan S. Wong
Willy Susilo
2012
PKC
Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract)
Somindu C. Ramanna
Sanjit Chatterjee
Palash Sarkar
2012
PKC
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication
Shota Yamada
Nuttapong Attrapadung
Bagus Santoso
Jacob C. N. Schuldt
Goichiro Hanaoka
Noboru Kunihiro
2012
PKC
Waters Signatures with Optimal Security Reduction
Dennis Hofheinz
Tibor Jager
Edward Knapp