Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of PKC 2013
Page
Title
1
Packed Ciphertexts in LWE-based Homomorphic Encryption
14
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
32
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
50
Functional Encryption: Origins and Recent Developments
54
Vector Commitments and their Applications
72
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
89
Cryptography Using CAPTCHA Puzzles
106
Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications
124
Decentralized Attribute-Based Signatures
142
On the semantic security of functional encryption schemes
160
Attribute-Based Encryption with Fast Decryption
177
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
195
Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public ?
213
Revocable Identity-Based Encryption Revisited: Security Model and Construction
231
Improved (Hierarchical) Inner-Product Encryption from Lattices
249
Non-Interactive Key Exchange
267
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
287
Tighter Reductions for Forward-Secure Signature Schemes
307
Tagged One-Time Signatures: Tight Security and Optimal Tag Size
327
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures
345
Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
365
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
385
New Constructions and Applications of Trapdoor DDH Groups
403
Techniques for Efficient Secure Computation Based on Yao's Protocol
404
Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited
423
Robust Encryption, Revisited
440
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
457
Rate-Limited Secure Function Evaluation: Definitions and Constructions
475
Verifiable Elections That Scale for Free
493
On the Connection between Leakage Tolerance and Adaptive Security