학술논문

Public-key cryptography---PKC 2019. Part I.
Document Type
Proceedings Paper
Author
Source
Subject
94 Information and communication, circuits
  94-06 Proceedings, conferences, collections, etc.
Language
English
Abstract
\{For the 21st Conference see [MR3781003; MR3781028].\} \tpar {\bf Papers in this collection include the following:} \tpar Eyal\ Kushilevitz\ and Tamer\ Mour, ``Sub-logarithmic distributed oblivious RAM with small block size'', \nbp{3--33}. 3950907 \tpar Benoît\ Libert\ and Chen\ Qian, ``Lossy algebraic filters with short tags'', \nbp{34--65}. 3950908 \tpar Geoffroy\ Couteau\ and Michael\ Reichle, ``Non-interactive keyed-verification anonymous credentials'', \nbp{66--96}. 3950909 \tpar Alonso\ González, ``Shorter ring signatures from standard assumptions'', \nbp{99--126}. 3950910 \tpar Pratish\ Datta, Tatsuaki\ Okamoto\ and Katsuyuki\ Takashima, ``Efficient attribute-based signatures for unbounded arithmetic branching programs'', \nbp{127--158}. 3950911 \tpar Xavier\ Bultel, Pascal\ Lafourcade, Russell\ W. F. Lai, Giulio\ Malavolta, Dominique\ Schröder\ and Sri\ Aravinda Krishnan Thyagarajan, ``Efficient invisible and unlinkable sanitizable signatures'', \nbp{159--189}. 3950912 \tpar Lydia\ Garms\ and Anja\ Lehmann, ``Group signatures with selective linkability'', \nbp{190--220}. 3950913 \tpar Sherman\ S. M. Chow, Alexander\ Russell, Qiang\ Tang, Moti\ Yung, Yongjun\ Zhao\ and Hong-Sheng\ Zhou, ``Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog'', \nbp{221--251}. 3950914 \tpar Benoît\ Libert, Khoa\ Nguyen, Benjamin\ Hong Meng Tan\ and Huaxiong\ Wang, ``Zero-knowledge elementary databases with more expressive queries'', \nbp{255--285}. 3950915 \tpar Michael\ Backes, Lucjan\ Hanzlik, Amir\ Herzberg, Aniket\ Kate\ and Ivan\ Pryvalov, ``Efficient non-interactive zero-knowledge proofs in cross-domains without trusted setup'', \nbp{286--313}. 3950916 \tpar Vanesa\ Daza, Alonso\ González, Zaira\ Pindado, Carla\ Ràfols\ and Javier\ Silva, ``Shorter quadratic QA-NIZK proofs'', \nbp{314--343}. 3950917 \tpar Rafael\ del Pino, Vadim\ Lyubashevsky\ and Gregor\ Seiler, ``Short discrete log proofs for FHE and ring-LWE ciphertexts'', \nbp{344--373}. 3950926 \tpar Alessandra\ Scafuro, Luisa\ Siniscalchi\ and Ivan\ Visconti, ``Publicly verifiable proofs from blockchains'', \nbp{374--401}. 3950918 \tpar Aijun\ Ge\ and Puwen\ Wei, ``Identity-based broadcast encryption with efficient revocation'', \nbp{405--435}. 3950919 \tpar Roman\ Langrehr\ and Jiaxin\ Pan, ``Tightly secure hierarchical identity-based encryption'', \nbp{436--465}. 3950920 \tpar Ryo\ Nishimaki\ and Takashi\ Yamakawa, ``Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio'', \nbp{466--495}. 3950921 \tpar Michael\ Clear\ and Ciaran\ McGoldrick, ``Additively homomorphic IBE from higher residuosity'', \nbp{496--515}. 3950922 \tpar Dana\ Dachman-Soled\ and Mukul\ Kulkarni, ``Upper and lower bounds for continuous non-malleable codes'', \nbp{519--548}. 3950923 \tpar Takahiro\ Matsuda, Kenta\ Takahashi, Takao\ Murakami\ and Goichiro\ Hanaoka, ``Improved security evaluation techniques for imperfect randomness from arbitrary distributions'', \nbp{549--580}. 3950924 \tpar Dennis\ Hofheinz\ and Ngoc\ Khanh\ Nguyen, ``On tightly secure primitives in the multi-instance setting'', \nbp{581--611}. 3950925 \tpar

Online Access