Public-Key Cryptography - PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings / [electronic resource] :
edited by Hugo Krawczyk.
- XIV, 686 p. 59 illus. online resource.
- Lecture Notes in Computer Science, 8383 0302-9743 ; .
- Lecture Notes in Computer Science, 8383 .
Chosen ciphertext security.- Re-encryption -- Verifiable outsourcing -- Cryptanalysis -- Identity and attribute-based encryption -- Enhanced encryption -- Signature schemes -- Related-key security -- Functional authentication -- Quantum impossibility -- Privacy -- Protocols.
This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.
9783642546310
10.1007/978-3-642-54631-0 doi
Computer science.
Computer security.
Data encryption (Computer science).
Coding theory.
Algorithms.
Computer Science.
Data Encryption.
Systems and Data Security.
Coding and Information Theory.
Algorithm Analysis and Problem Complexity.
QA76.9.A25
005.82
Chosen ciphertext security.- Re-encryption -- Verifiable outsourcing -- Cryptanalysis -- Identity and attribute-based encryption -- Enhanced encryption -- Signature schemes -- Related-key security -- Functional authentication -- Quantum impossibility -- Privacy -- Protocols.
This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.
9783642546310
10.1007/978-3-642-54631-0 doi
Computer science.
Computer security.
Data encryption (Computer science).
Coding theory.
Algorithms.
Computer Science.
Data Encryption.
Systems and Data Security.
Coding and Information Theory.
Algorithm Analysis and Problem Complexity.
QA76.9.A25
005.82