{"title":"Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes","authors":"D. Dachman-Soled, Mukul Kulkarni, Aria Shahverdi","doi":"10.1007/978-3-662-54365-8_13","DOIUrl":"https://doi.org/10.1007/978-3-662-54365-8_13","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132177596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tightly Secure IBE Under Constant-Size Master Public Key","authors":"Jie Chen, Junqing Gong, J. Weng","doi":"10.1007/978-3-662-54365-8_9","DOIUrl":"https://doi.org/10.1007/978-3-662-54365-8_9","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114988239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-malleable Codes with Split-State Refresh","authors":"Antonio Faonio, J. Nielsen","doi":"10.1007/978-3-662-54365-8_12","DOIUrl":"https://doi.org/10.1007/978-3-662-54365-8_12","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129343191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Provably Secure NTRU Instances over Prime Cyclotomic Rings","authors":"Yang Yu, Guangwu Xu, Xiaoyun Wang","doi":"10.1007/978-3-662-54365-8_17","DOIUrl":"https://doi.org/10.1007/978-3-662-54365-8_17","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131177542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Johannes Krupp, Dominique Schröder, Mark Simkin, D. Fiore, G. Ateniese, S. Nürnberger
{"title":"Nearly Optimal Verifiable Data Streaming","authors":"Johannes Krupp, Dominique Schröder, Mark Simkin, D. Fiore, G. Ateniese, S. Nürnberger","doi":"10.1007/978-3-662-49384-7_16","DOIUrl":"https://doi.org/10.1007/978-3-662-49384-7_16","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120847462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions","authors":"Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka","doi":"10.1007/978-3-662-49384-7_5","DOIUrl":"https://doi.org/10.1007/978-3-662-49384-7_5","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123377139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Junzuo Lai, R. Deng, Changshe Ma, K. Sakurai, J. Weng
{"title":"CCA-Secure Keyed-Fully Homomorphic Encryption","authors":"Junzuo Lai, R. Deng, Changshe Ma, K. Sakurai, J. Weng","doi":"10.1007/978-3-662-49384-7_4","DOIUrl":"https://doi.org/10.1007/978-3-662-49384-7_4","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129167148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields","authors":"C. Petit, M. Kosters, Ange Messeng","doi":"10.1007/978-3-662-49387-8_1","DOIUrl":"https://doi.org/10.1007/978-3-662-49387-8_1","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129608220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chosen-Ciphertext Security from Subset Sum","authors":"Sebastian Faust, Daniel Masny, D. Venturi","doi":"10.1007/978-3-662-49384-7_2","DOIUrl":"https://doi.org/10.1007/978-3-662-49384-7_2","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"40 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131692254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity-Based Cryptosystems and Quadratic Residuosity","authors":"M. Joye","doi":"10.1007/978-3-662-49384-7_9","DOIUrl":"https://doi.org/10.1007/978-3-662-49384-7_9","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114778395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}