Public-Key Cryptography -- PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary 26 -- March 1, 2013, Proceedings (Lecture Notes in Computer Science, nr. 7778)
Editat de Kaoru Kurosawa, Goichiro Hanaokaen Limba Engleză Paperback – 11 Jan 2013
The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols.
Din seria Lecture Notes in Computer Science
-
Preț: 435.72 lei
-
20%
Preț: 1308.83 lei
-
20%
Preț: 982.82 lei
-
20%
Preț: 540.84 lei
-
20%
Preț: 371.05 lei
-
Preț: 431.41 lei
-
20%
Preț: 762.08 lei
-
20%
Preț: 534.81 lei
-
20%
Preț: 704.75 lei
-
11%
Preț: 560.44 lei
-
20%
Preț: 536.53 lei
-
20%
Preț: 537.92 lei
-
20%
Preț: 538.95 lei
-
11%
Preț: 674.34 lei
-
20%
Preț: 953.33 lei
-
20%
Preț: 704.93 lei
-
20%
Preț: 983.83 lei
-
20%
Preț: 596.03 lei
-
20%
Preț: 705.02 lei
-
20%
Preț: 1004.12 lei
-
20%
Preț: 762.22 lei
-
20%
Preț: 1093.63 lei
-
20%
Preț: 649.23 lei
-
20%
Preț: 539.02 lei
-
20%
Preț: 539.70 lei
-
20%
Preț: 719.73 lei
-
20%
Preț: 761.01 lei
-
20%
Preț: 593.20 lei
-
20%
Preț: 549.41 lei
-
20%
Preț: 649.36 lei
-
11%
Preț: 558.80 lei
-
20%
Preț: 651.21 lei
-
20%
Preț: 432.41 lei
-
20%
Preț: 595.09 lei
-
20%
Preț: 607.85 lei
-
20%
Preț: 820.44 lei
-
20%
Preț: 1038.60 lei
-
20%
Preț: 540.03 lei
-
20%
Preț: 540.33 lei
-
20%
Preț: 993.86 lei
-
20%
Preț: 530.88 lei
-
20%
Preț: 977.91 lei
-
20%
Preț: 828.98 lei
-
20%
Preț: 528.45 lei
-
20%
Preț: 655.17 lei
-
20%
Preț: 495.65 lei
-
20%
Preț: 652.75 lei
Preț: 320.92 lei
Puncte Express: 481
Preț estimativ în valută:
61.58€ • 66.30$ • 52.89£
61.58€ • 66.30$ • 52.89£
Carte tipărită la comandă
Livrare economică 25 iulie-08 august
Livrare express 17-27 iunie pentru 100.64 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642363610
ISBN-10: 364236361X
Pagini: 532
Ilustrații: XIV, 518 p. 46 illus.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.74 kg
Ediția: 2013
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science , Security and Cryptology
Locul publicării: Berlin, Heidelberg, Germany
ISBN-10: 364236361X
Pagini: 532
Ilustrații: XIV, 518 p. 46 illus.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.74 kg
Ediția: 2013
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science , Security and Cryptology
Locul publicării: Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Packed Ciphertexts in LWE-Based Homomorphic Encryption.- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size.- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions.- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security.
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size.- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions.- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security.
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size.- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions.- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security.
Textul de pe ultima copertă
This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013.
The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols.
The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols.
Caracteristici
Fast track conference proceedings
Unique visibility
State of the art research
Unique visibility
State of the art research