Skip to main content
  • Conference proceedings
  • © 2014

Public-Key Cryptography -- PKC 2014

17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8383)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): PKC: IACR International Conference on Public-Key Cryptography

Conference proceedings info: PKC 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (38 papers)

  1. Front Matter

  2. Chosen Ciphertext Security

    1. Simple Chosen-Ciphertext Security from Low-Noise LPN

      • Eike Kiltz, Daniel Masny, Krzysztof Pietrzak
      Pages 1-18
    2. Chosen Ciphertext Security via UCE

      • Takahiro Matsuda, Goichiro Hanaoka
      Pages 56-76
  3. Re-encryption

    1. Proxy Re-encryption from Lattices

      • Elena Kirshanova
      Pages 77-94
  4. Verifiable Outsourcing

    1. Verifiable Set Operations over Outsourced Databases

      • Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos
      Pages 113-130
    2. Verifiable Oblivious Storage

      • Daniel Apon, Jonathan Katz, Elaine Shi, Aishwarya Thiruvengadam
      Pages 131-148
    3. Achieving Privacy in Verifiable Computation with Multiple Servers – Without FHE and without Pre-processing

      • Prabhanjan Ananth, Nishanth Chandran, Vipul Goyal, Bhavana Kanukurthi, Rafail Ostrovsky
      Pages 149-166
    4. Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting

      • Sébastien Canard, David Pointcheval, Olivier Sanders
      Pages 167-184
  5. Cryptanalysis I

    1. Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences

      • Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun
      Pages 185-202
    2. Elliptic and Hyperelliptic Curves: A Practical Security Analysis

      • Joppe W. Bos, Craig Costello, Andrea Miele
      Pages 203-220
    3. Discrete Logarithm in GF(2809) with FFS

      • Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé et al.
      Pages 221-238
  6. Identity- and Attribute-Based Encryption

    1. Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications

      • Alex Escala, Javier Herranz, Benoît Libert, Carla Ràfols
      Pages 239-256
    2. A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption

      • Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
      Pages 275-292
    3. Online/Offline Attribute-Based Encryption

      • Susan Hohenberger, Brent Waters
      Pages 293-310
  7. Enhanced Encryption

    1. Scale-Invariant Fully Homomorphic Encryption over the Integers

      • Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi
      Pages 311-328
    2. Enhanced Chosen-Ciphertext Security and Applications

      • Dana Dachman-Soled, Georg Fuchsbauer, Payman Mohassel, Adam O’Neill
      Pages 329-344

Other Volumes

  1. Public-Key Cryptography – PKC 2014

About this book

This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.

Editors and Affiliations

  • IBM Research, USA

    Hugo Krawczyk

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access