|
|
|
|
LEADER |
09326cam a22011172 4500 |
001 |
0-1652146504 |
003 |
DE-627 |
005 |
20240122104951.0 |
007 |
cr uuu---uuuuu |
008 |
130306s2013 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642363627
|9 978-3-642-36362-7
|
024 |
7 |
|
|a 10.1007/978-3-642-36362-7
|2 doi
|
035 |
|
|
|a (DE-627)1652146504
|
035 |
|
|
|a (DE-576)37969459X
|
035 |
|
|
|a (DE-599)BSZ37969459X
|
035 |
|
|
|a (OCoLC)839974309
|
035 |
|
|
|a (ZBM)1258.94004
|
035 |
|
|
|a (DE-He213)978-3-642-36362-7
|
035 |
|
|
|a (EBP)040547043
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|
050 |
|
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
084 |
|
|
|a SS 4800
|q SEPA
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a *94-06
|2 msc
|
084 |
|
|
|a 94A60
|2 msc
|
084 |
|
|
|a 00B25
|2 msc
|
084 |
|
|
|a 54.62
|2 bkl
|
084 |
|
|
|a 54.38
|2 bkl
|
084 |
|
|
|a 54.10
|2 bkl
|
100 |
1 |
|
|a Kurosawa, Kaoru
|4 aut
|
245 |
1 |
0 |
|a Public-Key Cryptography – PKC 2013
|b 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings
|c edited by Kaoru Kurosawa, Goichiro Hanaoka
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer
|c 2013
|
300 |
|
|
|a Online-Ressource (XIV, 518 p. 46 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 7778
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
520 |
|
|
|a Packed Ciphertexts in LWE-Based Homomorphic Encryption.- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security. Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols.
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Information systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Coding theory
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Electronic commerce.
|
650 |
|
0 |
|a Information technology
|
655 |
|
7 |
|a Konferenzschrift
|y 2013
|z Nara
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4209133-0
|0 (DE-627)105106828
|0 (DE-576)210190094
|a Public-Key-Kryptosystem
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
700 |
1 |
|
|a Hanaoka, Goichiro
|0 (DE-588)1027270883
|0 (DE-627)728772310
|0 (DE-576)372753752
|4 oth
|
776 |
1 |
|
|z 9783642363610
|
776 |
0 |
8 |
|i Buchausg. u.d.T.
|t Public-key cryptography - PKC 2013
|d Heidelberg [u.a.] : Springer, 2013
|h XIV, 518 S.
|w (DE-627)735152624
|w (DE-576)385229062
|z 364236361X
|z 9783642363610
|
830 |
|
0 |
|a Lecture notes in computer science
|v 7778
|9 7778
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-36362-7
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz37969459xcov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20130402155338
|3 Cover
|
856 |
4 |
2 |
|u https://zbmath.org/?q=an:1258.94004
|m B:ZBM
|v 2021-04-12
|x Verlag
|y Zentralblatt MATH
|3 Inhaltstext
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|b 2013
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SCS
|b 2013
|
912 |
|
|
|a ZDB-2-SXCS
|b 2013
|
912 |
|
|
|a ZDB-2-SEB
|b 2013
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.62
|j Datenstrukturen
|q SEPA
|0 (DE-627)106403265
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
936 |
b |
k |
|a 54.10
|j Theoretische Informatik
|q SEPA
|0 (DE-627)106418815
|
951 |
|
|
|a BO
|
950 |
|
|
|a Öffentlicher Schlüssel
|
950 |
|
|
|a Kryptosystem
|
950 |
|
|
|a Offenes Verschlüsselungssystem
|
950 |
|
|
|a Asymmetrisches Kryptosystem
|
950 |
|
|
|a Zwei-Schlüssel-System
|
950 |
|
|
|a System mit allbekannten Schlüsseln
|
950 |
|
|
|a Two-Key-Kryptosystem
|
950 |
|
|
|a Asymmetrisches Verschlüsselungssystem
|
950 |
|
|
|a Öffentliches Schlüsselsystem
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-36362-7
|9 DE-14
|
852 |
|
|
|a DE-14
|x epn:3356850393
|z 2013-03-06T11:58:49Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-36362-7
|9 DE-15
|
852 |
|
|
|a DE-15
|x epn:3356850466
|z 2013-03-06T11:58:49Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-36362-7
|9 DE-Ch1
|
852 |
|
|
|a DE-Ch1
|x epn:3356850539
|z 2013-03-06T11:58:49Z
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-36362-7
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|x epn:335685058X
|z 2013-03-06T11:58:49Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-36362-7
|9 DE-520
|
852 |
|
|
|a DE-520
|x epn:3356850652
|z 2013-03-06T11:58:49Z
|
980 |
|
|
|a 1652146504
|b 0
|k 1652146504
|o 37969459X
|
SOLR
_version_ |
1792258592939704320 |
access_facet |
Electronic Resources |
author |
Kurosawa, Kaoru |
author2 |
Hanaoka, Goichiro |
author2_role |
oth |
author2_variant |
g h gh |
author_facet |
Kurosawa, Kaoru, Hanaoka, Goichiro |
author_role |
aut |
author_sort |
Kurosawa, Kaoru |
author_variant |
k k kk |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25 |
callnumber-search |
QA76.9.A25 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS |
contents |
Packed Ciphertexts in LWE-Based Homomorphic Encryption.- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security. Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security., This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols. |
ctrlnum |
(DE-627)1652146504, (DE-576)37969459X, (DE-599)BSZ37969459X, (OCoLC)839974309, (ZBM)1258.94004, (DE-He213)978-3-642-36362-7, (EBP)040547043 |
de15_date |
2013-03-06T11:58:49Z |
dech1_date |
2013-03-06T11:58:49Z |
doi_str_mv |
10.1007/978-3-642-36362-7 |
era_facet |
2013 |
facet_912a |
ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Public-Key-Kryptosystem |
finc_class_facet |
Informatik, Allgemeines, Mathematik |
fincclass_txtF_mv |
science-computerscience |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent-conference |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2013 Nara (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Nara |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
7778 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1652146504 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer, 2013 |
imprint_str_mv |
Berlin, Heidelberg: Springer, 2013 |
institution |
DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15 |
is_hierarchy_id |
0-1652146504 |
is_hierarchy_title |
Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings |
isbn |
9783642363627 |
isbn_isn_mv |
9783642363610, 364236361X |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1652146504 |
language |
English |
last_indexed |
2024-02-29T18:23:05.59Z |
local_heading_facet_dezwi2 |
Computer science, Information systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Cryptography., Information theory., Electronic commerce., Information technology, Public-Key-Kryptosystem |
marc024a_ct_mv |
10.1007/978-3-642-36362-7 |
match_str |
kurosawa2013publickeycryptographypkc201316thinternationalconferenceonpracticeandtheoryinpublickeycryptographynarajapanfebruary26march12013proceedings |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)7778 |
names_id_str_mv |
(DE-588)1027270883, (DE-627)728772310, (DE-576)372753752 |
oclc_num |
839974309 |
physical |
Online-Ressource (XIV, 518 p. 46 illus, digital) |
publishDate |
2013 |
publishDateSort |
2013 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer |
record_format |
marcfinc |
record_id |
37969459X |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)3206483 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 7778 |
series2 |
Lecture Notes in Computer Science ; 7778, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Kurosawa, Kaoru aut, Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings edited by Kaoru Kurosawa, Goichiro Hanaoka, Berlin, Heidelberg Springer 2013, Online-Ressource (XIV, 518 p. 46 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7778, SpringerLink Bücher, Packed Ciphertexts in LWE-Based Homomorphic Encryption.- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security. Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security., This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols., Computer science, Information systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Cryptography., Information theory., Electronic commerce., Information technology, Konferenzschrift 2013 Nara (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4209133-0 (DE-627)105106828 (DE-576)210190094 Public-Key-Kryptosystem gnd, DE-101, Hanaoka, Goichiro (DE-588)1027270883 (DE-627)728772310 (DE-576)372753752 oth, 9783642363610, Buchausg. u.d.T. Public-key cryptography - PKC 2013 Heidelberg [u.a.] : Springer, 2013 XIV, 518 S. (DE-627)735152624 (DE-576)385229062 364236361X 9783642363610, Lecture notes in computer science 7778 7778 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-36362-7 X:SPRINGER Verlag lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz37969459xcov.jpg V:DE-576 X:springer image/jpeg 20130402155338 Cover, https://zbmath.org/?q=an:1258.94004 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://dx.doi.org/10.1007/978-3-642-36362-7 DE-14, DE-14 epn:3356850393 2013-03-06T11:58:49Z, http://dx.doi.org/10.1007/978-3-642-36362-7 DE-15, DE-15 epn:3356850466 2013-03-06T11:58:49Z, http://dx.doi.org/10.1007/978-3-642-36362-7 DE-Ch1, DE-Ch1 epn:3356850539 2013-03-06T11:58:49Z, http://dx.doi.org/10.1007/978-3-642-36362-7 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:335685058X 2013-03-06T11:58:49Z, http://dx.doi.org/10.1007/978-3-642-36362-7 DE-520, DE-520 epn:3356850652 2013-03-06T11:58:49Z |
spellingShingle |
Kurosawa, Kaoru, Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings, Lecture notes in computer science, 7778, Packed Ciphertexts in LWE-Based Homomorphic Encryption.- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security. Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security., This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols., Computer science, Information systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Cryptography., Information theory., Electronic commerce., Information technology, Konferenzschrift 2013 Nara, Public-Key-Kryptosystem |
swb_id_str |
37969459X |
title |
Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings |
title_auth |
Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings |
title_full |
Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings edited by Kaoru Kurosawa, Goichiro Hanaoka |
title_fullStr |
Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings edited by Kaoru Kurosawa, Goichiro Hanaoka |
title_full_unstemmed |
Public-Key Cryptography – PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings edited by Kaoru Kurosawa, Goichiro Hanaoka |
title_in_hierarchy |
7778. Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings (2013) |
title_short |
Public-Key Cryptography – PKC 2013 |
title_sort |
public key cryptography pkc 2013 16th international conference on practice and theory in public key cryptography nara japan february 26 march 1 2013 proceedings |
title_sub |
16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings |
title_unstemmed |
Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings |
topic |
Computer science, Information systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Cryptography., Information theory., Electronic commerce., Information technology, Konferenzschrift 2013 Nara, Public-Key-Kryptosystem |
topic_facet |
Computer science, Information systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Cryptography., Information theory., Electronic commerce., Information technology, Konferenzschrift, Public-Key-Kryptosystem |
url |
https://doi.org/10.1007/978-3-642-36362-7, https://swbplus.bsz-bw.de/bsz37969459xcov.jpg, https://zbmath.org/?q=an:1258.94004, http://dx.doi.org/10.1007/978-3-642-36362-7 |