default search action
17. PKC 2014: Buenos Aires, Argentina
- Hugo Krawczyk:
Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings. Lecture Notes in Computer Science 8383, Springer 2014, ISBN 978-3-642-54630-3
Chosen Ciphertext Security
- Eike Kiltz, Daniel Masny, Krzysztof Pietrzak:
Simple Chosen-Ciphertext Security from Low-Noise LPN. 1-18 - Baodong Qin, Shengli Liu:
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing. 19-36 - Dana Dachman-Soled:
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme. 37-55 - Takahiro Matsuda, Goichiro Hanaoka:
Chosen Ciphertext Security via UCE. 56-76
Re-encryption
- Elena Kirshanova:
Proxy Re-encryption from Lattices. 77-94 - Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa:
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices. 95-112
Verifiable Outsourcing
- Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos:
Verifiable Set Operations over Outsourced Databases. 113-130 - Daniel Apon, Jonathan Katz, Elaine Shi, Aishwarya Thiruvengadam:
Verifiable Oblivious Storage. 131-148 - Prabhanjan Ananth, Nishanth Chandran, Vipul Goyal, Bhavana Kanukurthi, Rafail Ostrovsky:
Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing. 149-166 - Sébastien Canard, David Pointcheval, Olivier Sanders:
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting. 167-184
Cryptanalysis I
- Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun:
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences. 185-202 - Joppe W. Bos, Craig Costello, Andrea Miele:
Elliptic and Hyperelliptic Curves: A Practical Security Analysis. 203-220 - Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé, Marion Videau, Paul Zimmermann:
Discrete Logarithm in GF(2809) with FFS. 221-238
Identity- and Attribute-Based Encryption
- Alex Escala, Javier Herranz, Benoît Libert, Carla Ràfols:
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications. 239-256 - Stefano Tessaro, David A. Wilson:
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts. 257-274 - Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption. 275-292 - Susan Hohenberger, Brent Waters:
Online/Offline Attribute-Based Encryption. 293-310
Enhanced Encryption
- Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Scale-Invariant Fully Homomorphic Encryption over the Integers. 311-328 - Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O'Neill:
Enhanced Chosen-Ciphertext Security and Applications. 329-344
Signature Schemes
- Adeline Langlois, San Ling, Khoa Nguyen, Huaxiong Wang:
Lattice-Based Group Signature Scheme with Verifier-Local Revocation. 345-361 - Jesper Buus Nielsen, Daniele Venturi, Angela Zottarel:
Leakage-Resilient Signatures with Graceful Degradation. 362-379 - Yannick Seurin:
On the Lossiness of the Rabin Trapdoor Function. 380-398
Cryptanalysis II
- Gengran Hu, Yanbin Pan, Feng Zhang:
Solving Random Subset Sum Problem by l p -norm SVP Oracle. 399-410 - Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice. 411-428 - Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret:
Lazy Modulus Switching for the BKW Algorithm on LWE. 429-445 - Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, Keita Xagawa:
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions. 446-464
Related-Key Security
- Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn:
Related Randomness Attacks for Public Key Encryption. 465-482 - Florian Böhl, Gareth T. Davies, Dennis Hofheinz:
Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks. 483-500
Functional Authentication
- Elette Boyle, Shafi Goldwasser, Ioana Ivan:
Functional Signatures and Pseudorandom Functions. 501-519 - Mihir Bellare, Georg Fuchsbauer:
Policy-Based Signatures. 520-537 - Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo:
Generalizing Homomorphic MACs for Arithmetic Circuits. 538-555
Quantum Impossibility
- Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter:
General Impossibility of Group Homomorphic Encryption in the Quantum World. 556-573
Privacy
- Dana Dachman-Soled:
On Minimal Assumptions for Sender-Deniable Public Key Encryption. 574-591 - Benoît Libert, Moti Yung, Marc Joye, Thomas Peters:
Traceable Group Encryption. 592-610 - Stanislaw Jarecki:
Practical Covert Authentication. 611-629
Protocols
- Alex Escala, Jens Groth:
Fine-Tuning Groth-Sahai Proofs. 630-649 - Chongwon Cho, Sanjam Garg, Rafail Ostrovsky:
Cross-Domain Secure Computation. 650-668 - Yong Li, Sven Schäge, Zheng Yang, Florian Kohlar, Jörg Schwenk:
On the Security of the Pre-shared Key Ciphersuites of TLS. 669-684
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.