Public-Key Cryptography -- PKC 2013

Public-Key Cryptography -- PKC 2013

4.11 - 1251 ratings - Source

This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols.This construction has been later generalized by Catalano et al. so as to work with q-ary trees instead of binary ones [10, 11] in order to obtain more efficient ... Thus, even if vector commitments reveal q in the clear, this does not compromise the security of ZK-EDBs. ... Let TMC = (KeyGen, HCom, HOpen, HVer, SCom, SOpen, SVer, Fake, HEquiv, SEquiv) be a trapdoor mercurial commitment and VC = (VC.

Title:Public-Key Cryptography -- PKC 2013
Author:Kaoru Kurosawa, Goichiro Hanaoka
Publisher:Springer - 2013-02-05


You Must CONTINUE and create a free account to access unlimited downloads & streaming