학술논문
Public-key cryptography---PKC 2019. Part I.
Document Type
Proceedings Paper
Author
Source
Subject
94 Information and communication, circuits
94-06Proceedings, conferences, collections, etc.
94-06
Language
English
Abstract
\{For the 21st Conference see [MR3781003; MR3781028].\}\tpar {\bf Papers in this collection include the following:}\tpar Eyal Kushilevitz and Tamer Mour, ``Sub-logarithmic distributedoblivious RAM with small block size'', \nbp{3--33}. 3950907\tpar Benoît Libert and Chen Qian, ``Lossy algebraic filters withshort tags'', \nbp{34--65}. 3950908\tpar Geoffroy Couteau and Michael Reichle, ``Non-interactivekeyed-verification anonymous credentials'', \nbp{66--96}. 3950909\tpar Alonso González, ``Shorter ring signatures from standardassumptions'', \nbp{99--126}. 3950910\tpar Pratish Datta, Tatsuaki Okamoto and Katsuyuki Takashima,``Efficient attribute-based signatures for unbounded arithmeticbranching programs'', \nbp{127--158}. 3950911\tpar Xavier Bultel, Pascal Lafourcade, Russell W. F. Lai, Giulio\Malavolta, Dominique Schröder and Sri Aravinda KrishnanThyagarajan, ``Efficient invisible and unlinkable sanitizablesignatures'', \nbp{159--189}. 3950912\tpar Lydia Garms and Anja Lehmann, ``Group signatures with selectivelinkability'', \nbp{190--220}. 3950913\tpar Sherman S. M. Chow, Alexander Russell, Qiang Tang, Moti Yung,Yongjun Zhao and Hong-Sheng Zhou, ``Let a non-barking watchdog bite:cliptographic signatures with an offline watchdog'', \nbp{221--251}.3950914\tpar Benoît Libert, Khoa Nguyen, Benjamin Hong Meng Tan andHuaxiong Wang, ``Zero-knowledge elementary databases with moreexpressive queries'', \nbp{255--285}. 3950915\tpar Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate andIvan Pryvalov, ``Efficient non-interactive zero-knowledge proofs incross-domains without trusted setup'', \nbp{286--313}. 3950916\tpar Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols andJavier Silva, ``Shorter quadratic QA-NIZK proofs'', \nbp{314--343}.3950917\tpar Rafael del Pino, Vadim Lyubashevsky and Gregor Seiler, ``Shortdiscrete log proofs for FHE and ring-LWE ciphertexts'', \nbp{344--373}.3950926\tpar Alessandra Scafuro, Luisa Siniscalchi and Ivan Visconti,``Publicly verifiable proofs from blockchains'', \nbp{374--401}. 3950918\tpar Aijun Ge and Puwen Wei, ``Identity-based broadcast encryption withefficient revocation'', \nbp{405--435}. 3950919\tpar Roman Langrehr and Jiaxin Pan, ``Tightly secure hierarchicalidentity-based encryption'', \nbp{436--465}. 3950920\tpar Ryo Nishimaki and Takashi Yamakawa, ``Leakage-resilientidentity-based encryption in bounded retrieval model with nearlyoptimal leakage-ratio'', \nbp{466--495}. 3950921\tpar Michael Clear and Ciaran McGoldrick, ``Additively homomorphic IBEfrom higher residuosity'', \nbp{496--515}. 3950922\tpar Dana Dachman-Soled and Mukul Kulkarni, ``Upper and lower bounds forcontinuous non-malleable codes'', \nbp{519--548}. 3950923\tpar Takahiro Matsuda, Kenta Takahashi, Takao Murakami and Goichiro\Hanaoka, ``Improved security evaluation techniques for imperfectrandomness from arbitrary distributions'', \nbp{549--580}. 3950924\tpar Dennis Hofheinz and Ngoc Khanh Nguyen, ``On tightly secureprimitives in the multi-instance setting'', \nbp{581--611}. 3950925\tpar