PKC 2013:
Kaoru Kurosawa (Ed.):
Public-Key Cryptography - 16th International Conference on Practice and Theory in Public-Key Cryptography - PKC 2013,
Nara, Japan,
February 26 - March 1, 2013
Proceedings.
PKC 2013
Nara, Japan,
February 26 - March 1, 2013
Organizational Committee
Program Chairs : | Kaoru Kurosawa | |
General Chair : | Goichiro Hanaoka |
Program Committee
Nuttapong Attrapadung |
David Cash |
Jean-Sébastien Coron |
Jintai Ding |
Stefan Dziembowski |
Marc Fischlin |
Pierre-Alain Fouque |
Steven D. Galbraith |
Rosario Gennaro |
S. Dov Gordon |
Shai Halevi |
Carmit Hazay |
Tibor Jager |
Antoine Joux |
Eike Kiltz |
Noboru Kunihiro |
Allison B. Lewko |
Benoît Libert |
Alexander May |
David Naccache |
Tatsuaki Okamoto |
Claudio Orlandi |
Chris Peikert |
Ludovic Perret |
Nigel P. Smart |
Tsuyoshi Takagi |
Katsuyuki Takashima |
Vinod Vaikuntanathan |
Hoeteck Wee |
External Referees
-
Homomorphic Encryption
-
Packed Ciphertexts in LWE-based Homomorphic Encryption
, 1,
Shai Halevi
,
Craig Gentry
,
Zvika Brakerski
bib info -
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
, 14,
Jonathan Katz
,
Aishwarya Thiruvengadam
,
Hong Sheng Zhou
bib info -
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
, 32,
Goichiro Hanaoka
,
Shota Yamada
,
Takahiro Matsuda
,
Keita Emura
,
Go Ohtake
bib info
-
Packed Ciphertexts in LWE-based Homomorphic Encryption
, 1,
Shai Halevi
,
Craig Gentry
,
Zvika Brakerski
- Invited Talk
-
Primitives
-
Vector Commitments and their Applications
, 54,
Dario Catalano
,
Dario Fiore
bib info -
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
, 72,
Jonathan Katz
,
Seung Geol Choi
,
Hoeteck Wee
,
Hong-Sheng Zhou
bib info -
Cryptography Using CAPTCHA Puzzles
, 89,
Rafail Ostrovsky
,
Omkant Pandey
,
Akshay Wadia
,
Abishek Kumarasubramanian
bib info -
Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications
, 106,
Huaxiong Wang
,
Damien Stehlé
,
San Ling
,
Khoa Nguyen
bib info
-
Vector Commitments and their Applications
, 54,
Dario Catalano
,
Dario Fiore
- Functional Encryption/Signatures
-
On RSA
-
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
, 177,
Tetsuya Izu
,
Noboru Kunihiro
,
Naoyuki Shinohara
bib info -
Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public ?
, 195,
Christophe Giraud
,
Guénaël Renault
,
Guillaume Barbu
,
Alberto Battistello
,
Guillaume Dabosville
,
Soline Renner
,
Rina Zeitoun
bib info
-
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
, 177,
Tetsuya Izu
,
Noboru Kunihiro
,
Naoyuki Shinohara
-
IBE and IPE
-
Revocable Identity-Based Encryption Revisited: Security Model and Construction
, 213,
Jae Hong Seo
,
Keita Emura
bib info -
Improved (Hierarchical) Inner-Product Encryption from Lattices
, 231,
Keita Xagawa
bib info -
Techniques for Efficient Secure Computation Based on Yao's Protocol
, 403,
Yehuda Lindell
bib info
-
Revocable Identity-Based Encryption Revisited: Security Model and Construction
, 213,
Jae Hong Seo
,
Keita Emura
- Invited Talk
- Key Exchange
- Signature Schemes I
-
Encryption
-
Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited
, 404,
Goichiro Hanaoka
,
Takahiro Matsuda
bib info -
Robust Encryption, Revisited
, 423,
Kenneth G. Paterson
,
Benoît Libert
,
Pooya Farshim
,
Elizabeth A. Quaglia
bib info -
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
, 440,
Shengli Liu
,
Zhengan Huang
,
Baodong Qin
bib info
-
Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited
, 404,
Goichiro Hanaoka
,
Takahiro Matsuda
-
Signature Schemes II
-
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures
, 327,
Nuttapong Attrapadung
,
Benoît Libert
,
Thomas Peters
bib info -
Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
, 345,
Keita Xagawa
,
Ryo Nishimaki
bib info -
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
, 365,
Moti Yung
,
Dong Hoon Lee
,
Kwangsu Lee
bib info -
New Constructions and Applications of Trapdoor DDH Groups
, 385,
Yannick Seurin
bib info
-
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures
, 327,
Nuttapong Attrapadung
,
Benoît Libert
,
Thomas Peters
-
Protocols
-
Rate-Limited Secure Function Evaluation: Definitions and Constructions
, 457,
Payman Mohassel
,
Özgür Dagdelen
,
Daniele Venturi
bib info -
Verifiable Elections That Scale for Free
, 475,
Anna Lysyanskaya
,
Melissa Chase
,
Markulf Kohlweiss
,
Sarah Meiklejohn
bib info -
On the Connection between Leakage Tolerance and Adaptive Security
, 493,
Jesper Buus Nielsen
,
Daniele Venturi
,
Angela Zottarel
bib info
-
Rate-Limited Secure Function Evaluation: Definitions and Constructions
, 457,
Payman Mohassel
,
Özgür Dagdelen
,
Daniele Venturi