Skip to main content
  • Conference proceedings
  • © 2016

Public-Key Cryptography – PKC 2016

19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9614)

Part of the book sub series: Security and Cryptology (LNSC)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (17 papers)

  1. Front Matter

    Pages I-XIV
  2. CCA Security

    1. Front Matter

      Pages 1-1
    2. Chosen-Ciphertext Security from Subset Sum

      • Sebastian Faust, Daniel Masny, Daniele Venturi
      Pages 35-46
    3. On the Hardness of Proving CCA-Security of Signed ElGamal

      • David Bernhard, Marc Fischlin, Bogdan Warinschi
      Pages 47-69
    4. CCA-Secure Keyed-Fully Homomorphic Encryption

      • Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng
      Pages 70-98
    5. On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions

      • Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
      Pages 99-129
  3. Functional Encryption

    1. Front Matter

      Pages 131-131
    2. Extended Nested Dual System Groups, Revisited

      • Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang
      Pages 133-163
    3. Functional Encryption for Inner Product with Full Function Privacy

      • Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
      Pages 164-195
    4. Deniable Functional Encryption

      • Angelo De Caro, Vincenzo Iovino, Adam O’Neill
      Pages 196-222
  4. Identity-Based Encryption

    1. Front Matter

      Pages 223-223
  5. Signatures

    1. Front Matter

      Pages 281-281
    2. Attribute-Based Signatures for Circuits from Bilinear Map

      • Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hanaoka
      Pages 283-300
    3. Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys

      • Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider, Dominique Schröder, Mark Simkin
      Pages 301-330
    4. Fault-Tolerant Aggregate Signatures

      • Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Andy Rupp
      Pages 331-356
    5. Delegatable Functional Signatures

      • Michael Backes, Sebastian Meiser, Dominique Schröder
      Pages 357-386
    6. Mitigating Multi-target Attacks in Hash-Based Signatures

      • Andreas Hülsing, Joost Rijneveld, Fang Song
      Pages 387-416

About this book

The two-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March 2016.
The 34 revised papers presented were carefully reviewed and selected from 143 submissions. They are organized in topical sections named: CCA security, functional encryption, identity-based encryption, signatures, cryptanalysis, leakage-resilient and circularly secure encryption, protocols, and primitives.

Editors and Affiliations

  • National Taiwan University, Taipei, Taiwan

    Chen-Mou Cheng

  • Academia Sinica, Taipei, Taiwan

    Kai-Min Chung, Bo-Yin Yang

  • Università di Salerno, Fisciano, Italy

    Giuseppe Persiano

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access