PKC 2015
March 30 - April 1
Maryland, USA
PKC 2015
PKC 2015

Accepted Papers:

  1. "Bootstrapping BGV Ciphertexts with a Wider Choice of p and q," Emmanuela Orsini, Joop van de Pol, and Nigel P. Smart (University of Bristol)
  2. "Divisible E-Cash Made Practical," Sébastien Canard (Orange Labs), David Pointcheval (École Normale Supérieure/CNRS/INRIA), Olivier Sanders (Orange Labs and École Normale Supérieure/CNRS/INRIA), and Jacques Traoré (Orange Labs)
  3. "Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions," Jacob Alperin-Sheriff (Georgia Tech)
  4. "How Secure is Deterministic Encryption?" Mihir Bellare (UCSD), Rafael Dowsley (Karlsruhe Institute of Technology), and Sriram Keelveedhi
  5. "Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions," Jan Camenisch, Robert R. Enderlein, and Gregory Neven (IBM Research - Zurich)
  6. "Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms," Shengli Liu (Shanghai Jiao Tong University) and Kenneth G. Paterson (Royal Holloway University)
  7. "Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security," Baodong Qin (Shanghai Jiao Tong University and Southwest University of Science and Technology), Shengli Liu (Shanghai Jiao Tong University), Tsz Hon Yuen (Huawei), Robert H. Deng (Singapore Management University), and Kefei Chen (Hangzhou Normal University)
  8. "Collision of random walks and a refined analysis of attacks on discrete logarithm," Shuji Kijima (Kyushu University) and Ravi Montenegro (University of Massachusetts, Lowell)
  9. "Adaptive Witness Encryption and Asymmetric Password-Based Cryptography," Mihir Bellare (UCSD) and Viet Tung Hoang (University of Maryland, Georgetown University)
  10. "Simpler Efficient Group Signatures from Lattices," Phong Q. Nguyen (INRIA and Tsinghua University), Jiang Zhang (Chinese Academy of Sciences), and Zhenfeng Zhang (Chinese Academy of Sciences)
  11. "Packing Messages and Optimizing Bootstrapping in GSW-FHE," Ryo Hiromasa (Kyoto University), Masayuki Abe (NTT Secure Platform Laboratories), and Tatsuaki Okamoto (NTT Secure Platform Laboratories)
  12. "Tightly-Secure Signatures from Chameleon Hash Functions," Olivier Blazy (Universite de Limoges), Saqib A. Kakvi (Ruhr-University Bochum), Eike Kiltz (Ruhr-University Bochum), and Jiaxin Pan (Ruhr-University Bochum)
  13. "Simple Functional Encryption Schemes for Inner Products," Michel Abdalla, Florian Bourse, Angelo De Caro, and David Pointcheval (École Normale Supérieure)
  14. "Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds," Gilles Barthe (IMDEA Software Institute), Edvard Fagerholm (University of Pennsylvania), Dario Fiore (IMDEA Software Institute), Andre Scedrov (University of Pennsylvania), Benedikt Schmidt (IMDEA Software Institute), and Mehdi Tibouchi (NTT Secure Platform Laboratories)
  15. "On the Selective Opening Security of Practical Public-Key Encryption Schemes," Felix Heuer, Tibor Jager, Eike Kiltz, and Sven Schäge (Ruhr University Bochum)
  16. "Digital Signatures from Strong RSA without Prime Generation," David Cash (Rutgers University), Rafael Dowsley (Karlsruhe Institute of Technology), and Eike Kiltz (Ruhr University Bochum)
  17. "Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based," San Ling (Nanyang Technological University), Khoa Nguyen (Nanyang Technological University), and Huaxiong Wang (Nanyang Technological University)
  18. "Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks," Michel Abdalla, Fabrice Benhamouda, and David Pointcheval (École Normale Supérieure)
  19. "One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model," Florian Bergsma, Tibor Jager, and Jörg Schwenk (Ruhr-University Bochum)
  20. "Additively Homomorphic UC commitments with Optimal Amortized Overhead," Ignacio Cascudo, Ivan Damgård, Bernardo David, Irene Giacomelli, Jesper Buus Nielsen, and Roberto Trifiletti (Aarhus University)
  21. "Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification," Nico Döttling (Aarhus University)
  22. "A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups," Allison B. Lewko (Columbia University) and Sarah Meiklejohn (UCL)
  23. "A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems," Jean-Charles Faugère (Sorbonne Universitès and INRIA), Danilo Gligoroski (NTNU), Ludovic Perret (INRIA and CNRS), Simona Samardjiska (NTNU and UKIM), and Enrico Thomae (Ruhr-University Bochum)
  24. "Interactive Message-Locked Encryption and Secure Deduplication," Mihir Bellare (UCSD) and Sriram Keelveedhi
  25. "On the Practical Security of Inner Product Functional Encryption," Shashank Agrawal (UIUC), Shweta Agrawal (IIT Delhi), Saikrishna Badrinarayanan (UCLA), Abishek Kumarasubramanian (Google), Manoj Prabhakaran (UIUC), and Amit Sahai (UCLA)
  26. "Simple Lattice Trapdoor Sampling from a Broad Class of Distributions," Vadim Lyubashevsky (Inria/ENS) and Daniel Wichs (Northeastern University)
  27. "Algebraic Cryptanalysis of a Quantum Money Scheme -- the Noise-Free Case," Marta Conde Pena (Institute of Physical and Information Technologies - Spanish National Research Council), Jean-Charles Faugère (INRIA and CNRS), and Ludovic Perret (Sorbonne Universites and INRIA)
  28. "Faster ECC over GF(2^521 - 1)," Robert Granger (EPFL) and Michael Scott (CertiVox Labs)
  29. "Secure Efficient History-Hiding Append-Only Signatures in the Standard Model," Benoît Libert (ENS Lyon), Marc Joye (Technicolor), Moti Yung (Google & Columbia University), and Thomas Peters (ENS)
  30. "Making Sigma-Protocols Non-interactive without Random Oracles," Pyrros Chaidos and Jens Groth (University College London)
  31. "A Tamper and Leakage Resilient von Neumann Architecture," Sebastian Faust (EPFL), Pratyay Mukherjee (Aarhus University), Jesper Buus Nielsen (Aarhus University), and Daniele Venturi (Sapienza University of Rome)
  32. "Identity-Based Encryption with (Almost) Tight Security in the Multi-Instance, Multi-Ciphertext Setting," Dennis Hofheinz, Jessica Koch, and Christoph Striecks (KIT)
  33. "Adaptive Proofs of Knowledge in the Random Oracle Model," David Bernhard (University of Bristol), Bogdan Warinschi (University of Bristol), and Marc Fischlin (TU Darmstadt)
  34. "Anonymous Transferable E-Cash," Foteini Baldimtsi (Boston University), Melissa Chase (Microsoft Research), Georg Fuchsbauer (IST Austria), and Markulf Kohlweiss (Microsoft Research)
  35. "A Polynomial-Time Attack on the BBCRS Scheme," Alain Couvreur (INRIA & LIX, École Polytechnique), Ayoub Otmani (University of Rouen), Jean-Pierre Tillich (INRIA), and Valérie Gautier Umaña (Universidad del Rosario)
  36. "Predicate Encryption for Multi-Dimensional Range Queries from Lattices," Romain Gay (ENS), Pierrick Méaux (ENS, INRIA), and Hoeteck Wee (CNRS, ENS)