default search action
22nd PKC 2019: Beijing, China
- Dongdai Lin, Kazue Sako:
Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11442, Springer 2019, ISBN 978-3-030-17252-7
Cryptographic Protocols
- Eyal Kushilevitz, Tamer Mour:
Sub-logarithmic Distributed Oblivious RAM with Small Block Size. 3-33 - Benoît Libert, Chen Qian:
Lossy Algebraic Filters with Short Tags. 34-65 - Geoffroy Couteau, Michael Reichle:
Non-interactive Keyed-Verification Anonymous Credentials. 66-96
Digital Signatures
- Alonso González:
Shorter Ring Signatures from Standard Assumptions. 99-126 - Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima:
Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs. 127-158 - Xavier Bultel, Pascal Lafourcade, Russell W. F. Lai, Giulio Malavolta, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan:
Efficient Invisible and Unlinkable Sanitizable Signatures. 159-189 - Lydia Garms, Anja Lehmann:
Group Signatures with Selective Linkability. 190-220 - Sherman S. M. Chow, Alexander Russell, Qiang Tang, Moti Yung, Yongjun Zhao, Hong-Sheng Zhou:
Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog. 221-251
Zero-Knowledge
- Benoît Libert, Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang:
Zero-Knowledge Elementary Databases with More Expressive Queries. 255-285 - Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup. 286-313 - Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols, Javier Silva:
Shorter Quadratic QA-NIZK Proofs. 314-343 - Rafaël del Pino, Vadim Lyubashevsky, Gregor Seiler:
Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts. 344-373 - Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti:
Publicly Verifiable Proofs from Blockchains. 374-401
Identity-Based Encryption
- Aijun Ge, Puwen Wei:
Identity-Based Broadcast Encryption with Efficient Revocation. 405-435 - Roman Langrehr, Jiaxin Pan:
Tightly Secure Hierarchical Identity-Based Encryption. 436-465 - Ryo Nishimaki, Takashi Yamakawa:
Leakage-Resilient Identity-Based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio. 466-495 - Michael Clear, Ciaran McGoldrick:
Additively Homomorphic IBE from Higher Residuosity. 496-515
Fundamental Primitives (I)
- Dana Dachman-Soled, Mukul Kulkarni:
Upper and Lower Bounds for Continuous Non-Malleable Codes. 519-548 - Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka:
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions. 549-580 - Dennis Hofheinz, Ngoc Khanh Nguyen:
On Tightly Secure Primitives in the Multi-instance Setting. 581-611
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.