


default search action
18. PKC 2015: Gaithersburg, MD, USA
- Jonathan Katz:

Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. Lecture Notes in Computer Science 9020, Springer 2015, ISBN 978-3-662-46446-5
Public-Key Encryption
- Shengli Liu, Kenneth G. Paterson:

Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. 3-26 - Felix Heuer, Tibor Jager, Eike Kiltz

, Sven Schäge
:
On the Selective Opening Security of Practical Public-Key Encryption Schemes. 27-51 - Mihir Bellare, Rafael Dowsley

, Sriram Keelveedhi:
How Secure is Deterministic Encryption? 52-73
E-Cash
- Sébastien Canard, David Pointcheval

, Olivier Sanders, Jacques Traoré:
Divisible E-Cash Made Practical. 77-100 - Foteini Baldimtsi, Melissa Chase, Georg Fuchsbauer, Markulf Kohlweiss

:
Anonymous Transferable E-Cash. 101-124
Cryptanalysis
- Shuji Kijima

, Ravi Montenegro:
Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem. 127-149 - Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae:

A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems. 150-174 - Alain Couvreur, Ayoub Otmani

, Jean-Pierre Tillich, Valérie Gauthier-Umaña
:
A Polynomial-Time Attack on the BBCRS Scheme. 175-193 - Marta Conde Pena, Jean-Charles Faugère, Ludovic Perret:

Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case. 194-213
Digital Signatures I
- David Cash, Rafael Dowsley

, Eike Kiltz
:
Digital Signatures from Strong RSA without Prime Generation. 217-235 - Jacob Alperin-Sheriff:

Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions. 236-255 - Olivier Blazy

, Saqib A. Kakvi
, Eike Kiltz
, Jiaxin Pan
:
Tightly-Secure Signatures from Chameleon Hash Functions. 256-279
Password-Based Authentication
- Jan Camenisch, Robert R. Enderlein, Gregory Neven:

Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions. 283-307 - Mihir Bellare, Viet Tung Hoang:

Adaptive Witness Encryption and Asymmetric Password-Based Cryptography. 308-331 - Michel Abdalla

, Fabrice Benhamouda
, David Pointcheval
:
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks. 332-352
Pairing-Based Cryptography
- Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov

, Benedikt Schmidt, Mehdi Tibouchi
:
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds. 355-376 - Allison B. Lewko, Sarah Meiklejohn:

A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups. 377-398
Digital Signatures II
- Phong Q. Nguyen, Jiang Zhang

, Zhenfeng Zhang:
Simpler Efficient Group Signatures from Lattices. 401-426 - San Ling

, Khoa Nguyen
, Huaxiong Wang:
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based. 427-449 - Benoît Libert, Marc Joye, Moti Yung, Thomas Peters:

Secure Efficient History-Hiding Append-Only Signatures in the Standard Model. 450-473
Efficient Constructions
- Florian Bergsma, Tibor Jager, Jörg Schwenk:

One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. 477-494 - Ignacio Cascudo

, Ivan Damgård, Bernardo Machado David, Irene Giacomelli, Jesper Buus Nielsen
, Roberto Trifiletti:
Additively Homomorphic UC Commitments with Optimal Amortized Overhead. 495-515 - Mihir Bellare, Sriram Keelveedhi:

Interactive Message-Locked Encryption and Secure Deduplication. 516-538 - Robert Granger

, Michael Scott:
Faster ECC over \mathbb F_2^521-1. 539-553
Cryptography with Imperfect Keys
- Baodong Qin, Shengli Liu, Tsz Hon Yuen

, Robert H. Deng
, Kefei Chen:
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. 557-578 - Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen

, Daniele Venturi
:
A Tamper and Leakage Resilient von Neumann Architecture. 579-603 - Nico Döttling:

Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification. 604-626
Interactive Proofs
- David Bernhard, Marc Fischlin, Bogdan Warinschi:

Adaptive Proofs of Knowledge in the Random Oracle Model. 629-649 - Pyrros Chaidos, Jens Groth

:
Making Sigma-Protocols Non-interactive Without Random Oracles. 650-670
Lattice-Based Cryptography
- Emmanuela Orsini

, Joop van de Pol, Nigel P. Smart:
Bootstrapping BGV Ciphertexts with a Wider Choice of p and q. 673-698 - Ryo Hiromasa, Masayuki Abe, Tatsuaki Okamoto:

Packing Messages and Optimizing Bootstrapping in GSW-FHE. 699-715 - Vadim Lyubashevsky, Daniel Wichs:

Simple Lattice Trapdoor Sampling from a Broad Class of Distributions. 716-730
Identity-Based, Predicate, and Functional Encryption
- Michel Abdalla

, Florian Bourse, Angelo De Caro, David Pointcheval
:
Simple Functional Encryption Schemes for Inner Products. 733-751 - Romain Gay

, Pierrick Méaux, Hoeteck Wee:
Predicate Encryption for Multi-dimensional Range Queries from Lattices. 752-776 - Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai:

On the Practical Security of Inner Product Functional Encryption. 777-798 - Dennis Hofheinz, Jessica Koch, Christoph Striecks:

Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting. 799-822

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














