PKC 2015:
Jonathan Katz (Eds.):
Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography
Gaithersburg, MD, USA,
March 30 - April 1, 2015
Proceedings.
PKC 2015
Organizational Committee
Program Chair : | Jonathan Katz | |
General Chair : | Rene Peralta |
Program Committee
Michel Abdalla |
Shweta Agrawal |
Melissa Chase |
Sherman S. M. Chow |
Jean-Sébastien Coron |
Jean-Charles Faugère |
Sebastian Faust |
Dario Fiore |
Georg Fuchsbauer |
Steven D. Galbraith |
Pierrick Gaudry |
Matthew Green |
Goichiro Hanaoka |
Carmit Hazay |
Eike Kiltz |
Benoît Libert |
Shengli Liu |
Anna Lysyanskaya |
Sarah Meiklejohn |
Dustin Moody |
Michael Naehrig |
Adam O |
Chris Peikert |
Dominique Schröder |
Peter Schwabe |
Jae Hong Seo |
Damien Stehlé |
Rainer Steinwandt |
- Public Key Encryption
-
Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
, 3-26,
Kenneth G. Paterson
,
Shengli Liu
bib info -
On the Selective Opening Security of Practical Public-Key Encryption Schemes
, 27-51,
Eike Kiltz
,
Tibor Jager
,
Sven Schäge
,
Felix Heuer
bib info -
How Secure is Deterministic Encryption?
, 52-73,
Mihir Bellare
,
Rafael Dowsley
,
Sriram Keelveedhi
bib info - E-Cash
-
Divisible E-Cash Made Practical
, 77-100,
David Pointcheval
,
Olivier Sanders
,
Sébastien Canard
,
Jacques Traoré
bib info -
Anonymous Transferable E-Cash
, 101-124,
Melissa Chase
,
Markulf Kohlweiss
,
Georg Fuchsbauer
,
Foteini Baldimtsi
bib info - Cryptanalysis
-
Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem
, 127-149,
Shuji Kijima
,
Ravi Montenegro
bib info f -
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
, 150-174,
Ludovic Perret
,
Danilo Gligoroski
,
Enrico Thomae
,
Simona Samardjiska
,
Jean-Charles Faugère
bib info -
A Polynomial-Time Attack on the BBCRS Scheme
, 175-193,
Jean-Pierre Tillich
,
Ayoub Otmani
,
Alain Couvreur
,
Valérie Gauthier-Umaña
bib info -
Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case
, 194-213,
Ludovic Perret
,
Jean-Charles Faugère
,
Marta Conde Pena
bib info - Digital Signatures
-
Digital Signatures from Strong RSA without Prime Generation
, 217-235,
Eike Kiltz
,
David Cash
,
Rafael Dowsley
bib info -
Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions
, 236-255,
Jacob Alperin-Sheriff
bib info -
Tightly-Secure Signatures from Chameleon Hash Functions
, 256-279,
Eike Kiltz
,
Olivier Blazy
,
Saqib A. Kakvi
,
Jiaxin Pan
bib info -
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
, 283-307,
Jan Camenisch
,
Gregory Neven
,
Robert R. Enderlein
bib info -
Adaptive Witness Encryption and Asymmetric Password-Based Cryptography
, 308-331,
Mihir Bellare
,
Viet Tung Hoang
bib info -
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
, 332-352,
Michel Abdalla
,
David Pointcheval
,
Fabrice Benhamouda
bib info - Pairing-Based Cryptography
-
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
, 355-376,
Andre Scedrov
,
Dario Fiore
,
Mehdi Tibouchi
,
Gilles Barthe
,
Edvard Fagerholm
,
Benedikt Schmidt
bib info -
A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups
, 377-398,
Allison B. Lewko
,
Sarah Meiklejohn
bib info - Digital Signatures II
-
Simpler Efficient Group Signatures from Lattices
, 401-426,
Phong Q. Nguyen
,
Jiang Zhang
,
Zhenfeng Zhang
bib info -
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based
, 427-449,
Huaxiong Wang
,
San Ling
,
Khoa Nguyen
bib info -
Secure Efficient History-Hiding Append-Only Signatures in the Standard Model
, 450-473,
Benoît Libert
,
Moti Yung
,
Marc Joye
,
Thomas Peters
bib info - Efficient Constructions
-
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
, 477-494,
Tibor Jager
,
Florian Bergsma
,
Jörg Schwenk
bib info -
Additively Homomorphic UC Commitments with Optimal Amortized Overhead
, 495-515,
Ivan DamgÃÂ¥rd
,
Jesper Buus Nielsen
,
Ignacio Cascudo
,
Irene Giacomelli
,
Roberto Trifiletti
,
Bernardo Machado David
bib info -
Interactive Message-Locked Encryption and Secure Deduplication
, 516-538,
Mihir Bellare
,
Sriram Keelveedhi
bib info -
Faster ECC over F
2
521
-1
, 539-553,
Michael Scott
,
Robert Granger
bib info - Cryptography with Imperfect Keys
-
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security
, 557-578,
Robert H. Deng
,
Tsz Hon Yuen
,
Kefei Chen
,
Shengli Liu
,
Baodong Qin
bib info -
A Tamper and Leakage Resilient von Neumann Architecture
, 579-603,
Jesper Buus Nielsen
,
Sebastian Faust
,
Daniele Venturi
,
Pratyay Mukherjee
bib info -
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
, 604-626,
Nico Döttling
bib info - Interactive Proofs
-
Adaptive Proofs of Knowledge in the Random Oracle Model
, 629-649,
Marc Fischlin
,
Bogdan Warinschi
,
David Bernhard
bib info -
Making Sigma-Protocols Non-interactive Without Random Oracles
, 650-670,
Jens Groth
,
Pyrros Chaidos
bib info - Lattice-Based Cryptography
-
Bootstrapping BGV Ciphertexts with a Wider Choice of p and q
, 673-698,
Nigel P. Smart
,
Emmanuela Orsini
,
Joop van de Pol
bib info -
Packing Messages and Optimizing Bootstrapping in GSW-FHE
, 699-715,
Masayuki Abe
,
Tatsuaki Okamoto
,
Ryo Hiromasa
bib info -
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
, 716-730,
Daniel Wichs
,
Vadim Lyubashevsky
bib info - dentity-Based, Predicate, and Functional Encryption
-
Simple Functional Encryption Schemes for Inner Products
, 733-751,
Michel Abdalla
,
David Pointcheval
,
Angelo De Caro
,
Florian Bourse
bib info -
Predicate Encryption for Multi-dimensional Range Queries from Lattices
, 752-776,
Hoeteck Wee
,
Romain Gay
,
Pierrick Méaux
bib info -
On the Practical Security of Inner Product Functional Encryption
, 777-798,
Amit Sahai
,
Manoj Prabhakaran
,
Shweta Agrawal
,
Shashank Agrawal
,
Abishek Kumarasubramanian
,
Saikrishna Badrinarayanan
bib info -
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
, 799-822,
Dennis Hofheinz
,
Jessica Koch
,
Christoph Striecks
bib info