Editors:
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8383)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): PKC: IACR International Conference on Public-Key Cryptography
Conference proceedings info: PKC 2014.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (38 papers)
-
Front Matter
-
Chosen Ciphertext Security
-
Verifiable Outsourcing
-
Identity- and Attribute-Based Encryption
About this book
This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.
Editors and Affiliations
-
IBM Research, USA
Hugo Krawczyk
Bibliographic Information
Book Title: Public-Key Cryptography -- PKC 2014
Book Subtitle: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings
Editors: Hugo Krawczyk
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-54631-0
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2014 2014
Softcover ISBN: 978-3-642-54630-3Published: 03 March 2014
eBook ISBN: 978-3-642-54631-0Published: 20 February 2014
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 686
Number of Illustrations: 59 b/w illustrations
Topics: Cryptology, Systems and Data Security, Coding and Information Theory, Algorithm Analysis and Problem Complexity