LEADER 07637nam 22007935 450 001 996466237803316 005 20220318183532.0 010 $a3-642-36362-8 024 7 $a10.1007/978-3-642-36362-7 035 $a(CKB)3520000000003534 035 $a(SSID)ssj0000880058 035 $a(PQKBManifestationID)11484784 035 $a(PQKBTitleCode)TC0000880058 035 $a(PQKBWorkID)10853301 035 $a(PQKB)10740331 035 $a(DE-He213)978-3-642-36362-7 035 $a(MiAaPQ)EBC3093315 035 $a(PPN)168330083 035 $a(EXLCZ)993520000000003534 100 $a20130217d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPublic-Key Cryptography -- PKC 2013$b[electronic resource] $e16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 -- March 1, 2013, Proceedings /$fedited by Kaoru Kurosawa, Goichiro Hanaoka 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XIV, 518 p. 46 illus.) 225 1 $aSecurity and Cryptology ;$v7778 300 $aInternational conference proceedings. 300 $aIncludes author index. 311 $a3-642-36361-X 327 $aPacked Ciphertexts in LWE-Based Homomorphic Encryption.- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao?s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security. Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao?s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security. 330 $aThis book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols. 410 0$aSecurity and Cryptology ;$v7778 606 $aData encryption (Computer science) 606 $aComputer security 606 $aCoding theory 606 $aInformation theory 606 $aE-commerce 606 $aApplication software 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 606 $aComputer Appl. in Administrative Data Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/I2301X 608 $aConference proceedings.$2fast 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aE-commerce. 615 0$aApplication software. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aCoding and Information Theory. 615 24$ae-Commerce/e-business. 615 24$aComputer Appl. in Administrative Data Processing. 676 $a005.8/2 702 $aKurosawa$b Kaoru$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHanaoka$b Goichiro$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466237803316 996 $aPublic-Key Cryptography -- PKC 2013$92593681 997 $aUNISA