


default search action
22nd PKC 2019: Beijing, China
- Dongdai Lin, Kazue Sako:

Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11443, Springer 2019, ISBN 978-3-030-17258-9
Public Key Encryptions
- Rishab Goyal, Satyanarayana Vusirikala, Brent Waters:

Collusion Resistant Broadcast and Trace from Positional Witness Encryption. 3-33 - Alessandra Scafuro:

Break-glass Encryption. 34-62 - Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody

, Ahmadreza Rahimi, Sruthi Sekar:
Registration-Based Encryption from Standard Assumptions. 63-93
Functional Encryption
- Zhedong Wang, Xiong Fan, Feng-Hao Liu:

FE for Inner Products and Its Application to Decentralized ABE. 97-127 - Michel Abdalla

, Fabrice Benhamouda
, Markulf Kohlweiss
, Hendrik Waldner
:
Decentralizing Inner-Product Functional Encryption. 128-157 - Shuichi Katsumata, Shota Yamada:

Non-zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. 158-188 - Sikhar Patranabis, Debdeep Mukhopadhyay, Somindu C. Ramanna:

Function Private Predicate Encryption for Low Min-Entropy Predicates. 189-219
Obfuscation Based Cryptography
- Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:

Adaptively Single-Key Secure Constrained PRFs for \mathrm NC^1. 223-253 - Ward Beullens, Hoeteck Wee:

Obfuscating Simple Functionalities from Knowledge Assumptions. 254-283
Re-encryption Schemes
- Aloni Cohen:

What About Bob? The Inadequacy of CPA Security for Proxy Reencryption. 287-316 - Georg Fuchsbauer, Chethan Kamath

, Karen Klein
, Krzysztof Pietrzak:
Adaptively Secure Proxy Re-encryption. 317-346
Fundamental Primitives (II)
- Yunhua Wen, Shengli Liu, Dawu Gu:

Generic Constructions of Robustly Reusable Fuzzy Extractor. 349-378 - Steven D. Galbraith

, Jake Massimo, Kenneth G. Paterson:
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. 379-407 - Lisa Kohl:

Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs. 408-437
Post Quantum Cryptography
- Shuichi Katsumata, Takahiro Matsuda, Atsushi Takayasu

:
Lattice-Based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance. 441-471 - Ron D. Rothblum, Adam Sealfon, Katerina Sotiraki:

Towards Non-Interactive Zero-Knowledge for NP from LWE. 472-503 - Thomas Pornin, Thomas Prest

:
More Efficient Algorithms for the NTRU Key Generation Using the Field Norm. 504-533 - Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu

:
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto. 534-564 - Jan-Pieter D'Anvers

, Qian Guo
, Thomas Johansson
, Alexander Nilsson
, Frederik Vercauteren, Ingrid Verbauwhede
:
Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes. 565-598 - Zhe Li, Chaoping Xing

, Sze Ling Yeo:
Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations. 599-617 - Haodong Jiang, Zhenfeng Zhang, Zhi Ma:

Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. 618-645 - Simon-Philipp Merz

, Christophe Petit
:
Factoring Products of Braids via Garside Normal Form. 646-678

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














