Skip to main content
  • Conference proceedings
  • © 2012

Public Key Cryptography -- PKC 2012

15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012, Proceedings

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7293)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): PKC: IACR International Conference on Public-Key Cryptography

Conference proceedings info: PKC 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (42 papers)

  1. Front Matter

  2. Homomorphic Encryption and LWE

    1. Better Bootstrapping in Fully Homomorphic Encryption

      • Craig Gentry, Shai Halevi, Nigel P. Smart
      Pages 1-16
    2. Polly Cracker, Revisited, Revisited

      • Gottfried Herold
      Pages 17-33
    3. Ring-LWE in Polynomial Rings

      • Léo Ducas, Alain Durmus
      Pages 34-51
    4. On Homomorphic Encryption and Chosen-Ciphertext Security

      • Brett Hemenway, Rafail Ostrovsky
      Pages 52-65
  3. Signature Schemes

    1. Waters Signatures with Optimal Security Reduction

      • Dennis Hofheinz, Tibor Jager, Edward Knapp
      Pages 66-83
    2. Space Efficient Signature Schemes from the RSA Assumption

      • Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
      Pages 102-119
  4. Code-Based and Multivariate Crypto

    1. Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes

      • Pierre-Louis Cayrel, Gerhard Hoffmann, Edoardo Persichetti
      Pages 138-155
    2. Public-Key Cryptography from New Multivariate Quadratic Assumptions

      • Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang
      Pages 190-205
  5. Public-Key Encryption: Special Properties

    1. Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

      • Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia
      Pages 206-224
    2. Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts

      • Nelly Fazio, Irippuge Milinda Perera
      Pages 225-242
    3. Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication

      • Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro
      Pages 243-261
  6. Identity-Based Encryption

    1. Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices

      • Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee
      Pages 280-297
    2. Variants of Waters’ Dual System Primitives Using Asymmetric Pairings

      • Somindu C. Ramanna, Sanjit Chatterjee, Palash Sarkar
      Pages 298-315
    3. From Selective to Full Security: Semi-generic Transformations in the Standard Model

      • Michel Abdalla, Dario Fiore, Vadim Lyubashevsky
      Pages 316-333

Other Volumes

  1. Public Key Cryptography – PKC 2012

About this book

This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.

Editors and Affiliations

  • Department of Computer Science, Cryptography and Complexity Theory, Darmstadt University of Technology, Darmstadt, Germany

    Marc Fischlin

  • Department of Computer Science, Darmstadt University of Technology, Darmstadt, Germany

    Johannes Buchmann

  • Department of Computing, University of Surrey, Guildford, UK

    Mark Manulis

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access