Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of pkc 2012
Page
Title
1-16
Better Bootstrapping in Fully Homomorphic Encryption
17-33
Polly Cracker, Revisited, Revisited
34-51
Ring-LWE in Polynomial Rings
52-65
On Homomorphic Encryption and Chosen-Ciphertext Security
66-83
Waters Signatures with Optimal Security Reduction
84-101
Strong Security from Probabilistic Signature Schemes
102-119
Space Efficient Signature Schemes from the RSA Assumption
120-137
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles
138-155
Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes
156-171
Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited
172-189
Public-Key Identification Schemes Based on Multivariate Cubic Polynomials
190-205
Public-Key Cryptography from New Multivariate Quadratic Assumptions
206-224
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
225-242
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
243-261
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication
262-279
Public Key Encryption against Related Key Attacks
280-297
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
298-315
Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract)
316-333
From Selective to Full Security: Semi-generic Transformations in the Standard Model
334-352
Circular and KDM Security for Identity-Based Encryption
353-371
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
372-389
Generating Provable Primes Efficiently on Embedded Devices
390-397
Password-Based Authenticated Key Exchange
398-412
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series
413-430
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
431-448
Efficiently Shuffling in Public
449-466
Efficient Password Authenticated Key Exchange via Oblivious Transfer
467-484
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
485-503
Relatively-Sound NIZKs and Password-Based Key-Exchange
504-521
Multi-location Leakage Resilient Cryptography
522-539
On Definitions of Selective Opening Security
540-557
New Definitions and Separations for Circular Security
558-575
Correlated Product Security from Any One-Way Function
576-594
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms
595-608
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve
609-626
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods
627-643
Extended-DDH and Lossy Trapdoor Functions
644-661
DDH-Like Assumptions Based on Extension Rings
662-679
Security of Blind Signatures Revisited
680-696
Efficient Network Coding Signatures in the Standard Model
697-714
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
715-732
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking