ebook img

Public-Key Cryptography – PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings PDF

699 Pages·2014·8.12 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Public-Key Cryptography – PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings

Hugo Krawczyk (Ed.) Public-Key 3 Cryptography – 8 3 8 S PKC 2014 C N L 17th International Conference on Practice and Theory in Public-Key Cryptography Buenos Aires, Argentina, March 26–28, 2014, Proceedings 123 Lecture Notes in Computer Science 8383 CommencedPublicationin1973 FoundingandFormerSeriesEditors: GerhardGoos,JurisHartmanis,andJanvanLeeuwen EditorialBoard DavidHutchison LancasterUniversity,UK TakeoKanade CarnegieMellonUniversity,Pittsburgh,PA,USA JosefKittler UniversityofSurrey,Guildford,UK JonM.Kleinberg CornellUniversity,Ithaca,NY,USA AlfredKobsa UniversityofCalifornia,Irvine,CA,USA FriedemannMattern ETHZurich,Switzerland JohnC.Mitchell StanfordUniversity,CA,USA MoniNaor WeizmannInstituteofScience,Rehovot,Israel OscarNierstrasz UniversityofBern,Switzerland C.PanduRangan IndianInstituteofTechnology,Madras,India BernhardSteffen TUDortmundUniversity,Germany DemetriTerzopoulos UniversityofCalifornia,LosAngeles,CA,USA DougTygar UniversityofCalifornia,Berkeley,CA,USA GerhardWeikum MaxPlanckInstituteforInformatics,Saarbruecken,Germany Hugo Krawczyk (Ed.) Public-Key Cryptography – PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography BuenosAires,Argentina, March 26-28, 2014 Proceedings 1 3 VolumeEditor HugoKrawczyk IBMT.J.WatsonResearchCenter 1101KitchawanRoad,YorktownHeights,NY10598,USA E-mail:[email protected] ISSN0302-9743 e-ISSN1611-3349 ISBN978-3-642-54630-3 e-ISBN978-3-642-54631-0 DOI10.1007/978-3-642-54631-0 SpringerHeidelbergNewYorkDordrechtLondon LibraryofCongressControlNumber:2014932835 CRSubjectClassification(1998): LNCSSublibrary:SL4–SecurityandCryptology ©InternationalAssociationforCryptologicResearch2014 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartof thematerialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation, broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodology nowknownorhereafterdeveloped.Exemptedfromthislegalreservationarebriefexcerptsinconnection withreviewsorscholarlyanalysisormaterialsuppliedspecificallyforthepurposeofbeingenteredand executedonacomputersystem,forexclusiveusebythepurchaserofthework.Duplicationofthispublication orpartsthereofispermittedonlyundertheprovisionsoftheCopyrightLawofthePublisher’slocation, inistcurrentversion,andpermissionforusemustalwaysbeobtainedfromSpringer.Permissionsforuse maybeobtainedthroughRightsLinkattheCopyrightClearanceCenter.Violationsareliabletoprosecution undertherespectiveCopyrightLaw. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Whiletheadviceandinformationinthisbookarebelievedtobetrueandaccurateatthedateofpublication, neithertheauthorsnortheeditorsnorthepublishercanacceptanylegalresponsibilityforanyerrorsor omissionsthatmaybemade.Thepublishermakesnowarranty,expressorimplied,withrespecttothe materialcontainedherein. Typesetting:Camera-readybyauthor,dataconversionbyScientificPublishingServices,Chennai,India Printedonacid-freepaper SpringerispartofSpringerScience+BusinessMedia(www.springer.com) Preface PKC2014,the17thAnnualIACRInternationalConferenceonPracticeandThe- ory of Public-Key Cryptography, was held in Buenos Aires, Argentina, during March26–28, 2014. The conference, sponsored by the International Association for Cryptologic Research (IACR), focuses on all technical aspects of public-key cryptography-includingtheory,design,analysis,cryptanalysis,implementation and applications. This was the first PKC to be held in South America. These proceedings contain 38 papers selected by the Program Committee from a total of 145 submissions - the second highest number in the conference’s history. The many high-quality submissions made it easy to build a good pro- gram but also required rejecting good papers. Each submission was judged by atleastthree reviewers,or four inthe caseof submissionsby ProgramCommit- tee members. The selection process included five weeks of focused independent review followed by five weeks of lengthy discussions. At the end of the 10-week review period the reports and discussions produced over 38,000 lines of text, a testamentto the dedicationandthoroughnessofthe ProgramCommittee mem- bers.Thiswonderfulworkwouldhavebeenimpossiblewithoutthecollaboration of 150 members of our community that served as external reviewers. To them and all the members of the ProgramCommittee I am truly grateful. My sincere gratitude goes also to the hundreds of authors that submitted their excellent work - without them there wouldn’t be a conference. The program also featured two excellent invited lectures: “Post-Snowden Cryptography”byAdiShamirand“MultilinearMapsandObfuscation”byShai Halevi.OnbehalfoftheProgramCommittee,IwouldliketothankAdiandShai for kindly accepting our invitation. The work of a program chair and a successful conference depend on many people that deserve special thanks. Ariel Waissbein and Juan Garay, the con- ference general chairs, did a wonderful job organizing the event and managing its many complexities. Shai Halevi’s excellent submission and review software was pivotal for the smooth management of the review process, and he was kind enough to patiently answer my many questions. A special mention goes to the PKC steering committee for their organization of the PKC conferences for so manyyearsandforgivingustheopportunitytobringcryptographytothispart oftheplanet.Finally,Iwanttothankoursponsors:Argentina’sMinistryofSci- ence,TechnologyandProductiveInnovation,Fundacio´nSadosky,IBMResearch, and Microsoft Research. February 2014 Hugo Krawczyk PKC 2014 The 17th IACR International Conference on Practice and Theory of Public-Key Cryptography Buenos Aires, Argentina March 26–28, 2014 Sponsored by the International Association of Cryptologic Research General Chair Ariel Waissbein General Co-chair Juan A. Garay Yahoo Labs, USA Program Chair Hugo Krawczyk IBM T.J. Watson Research Center, USA Program Committee Michel Abdalla E´cole Normale Sup´erieure and CNRS, France Masayuki Abe NTT, Japan Paulo Barreto University of S˜ao Paulo, Brazil Alexandra Boldyreva Georgia Institute of Technology, USA Colin Boyd NTNU, Norway and QUT, Australia David Cash Rutgers University, USA Jung Hee Cheon Seoul National University, Korea Nelly Fazio City College of CUNY, USA Sanjam Garg IBM Research, USA Dov Gordon Applied Communication Sciences, USA Jens Groth University College London, UK VIII PKC 201 Nadia Heninger University of Pennsylvania, USA Amir Herzberg Bar Ilan University, Israel Alejandro Hevia University of Chile, Chile Susan Hohenberger Johns Hopkins University, USA Stanislaw Jarecki UC Irvine, USA Aggelos Kiayias University of Athens, Greece Vladimir Kolesnikov Bell Labs, USA Kaoru Kurosawa Ibaraki University, Japan Tanja Lange Technische University of Eindhoven, The Netherlands Allison Lewko Microsoft Research New England, USA Vadim Lyubashevsky Inria and E´cole Normale Sup´erieure, France Mark Manulis University of Surrey, UK Ilya Mironov Microsoft Research Silicon Valley, USA Antonio Nicolosi Stevens Institute of Technology, USA Jesper Buus Nielsen Aarhus University, Denmark Kenny Paterson Royal Holloway - University of London, UK Benny Pinkas Bar Ilan University, Israel Elizabeth Quaglia E´cole Normale Sup´erieure, France Mariana Raykova IBM Research and SRI, USA Dominique Unruh University of Tartu, Estonia Yevgeniy Vahlis AT&T Labs, USA Hoeteck Wee George Washington University, USA Daniel Wichs Northeastern University, USA External Reviewers Gora Adj Dong-Pyo Chi Nethanel Gelernter Martin Albrecht Chongwon Cho Rosario Gennaro Prabhanjan Ananth Tung Chou Yossi Gilad Diego F. Aranha Dana Dachman-Soled Niv Gilboa Chung Hun Baek Daniel Dadush Danilo Gligoroski Manuel Barbosa Ivan Damgaard Sasha Golovnev Mihir Bellare Bernardo Machardo Alonso Gonzalez Fabrice Benhamouda David Louis Goubin Daniel J. Bernstein Leo Ducas Vipul Goyal Joppe Bos Fr´ed´eric Dupuis Divya Gupta Charles Bouillaguet Konrad Durnoga Tim Guneysu Elette Boyle Stefan Dziembowski Shai Halevi Angelo De Caro Robert Enderlein Fabrice Ben Hamouda Andrea Cerulli Michele Feltz Kristiyan Haralambiev Pyrros Chaidos Marc Fischlin Carmit Hazay Nishanth Chandran Eduarda Freire Francisco Melissa Chase Jun Furukawa Rodr´ıguez Henr´ıquez Jie Chen Steven Galbraith Ryo Hiromasa PKC 201 IX Dennis Hofheinz Daniele Micciancio Hyunsook Hong Ben Smith Yuval Ishai Pratyay Mukherjee Yongsoo Song Ioana Elisabeta Ivan Ryo Nishimaki Douglas Stebila Abhishek Jain Gregory Neven Damien Stehle Min Young Jun Attrapadung Nuttapong Ron Steinfeld Charanjit Jutla Adam O’Neill Falko Strenzke Franziskus Kiefer Miyako Ohkubo Michael Sudkevitch Eike Kiltz Yossi Oren Katsuyuki Takashima Jinsu Kim Jung Youl Park Qiang Tang Min Kyu Kim Anat Paskin-Cherniavsky Sidharth Telang Miran Kim Chris Peikert Aris Tentes Sungwook Kim Milinda Perera Stefano Tessaro Taechan Kim Ludovic Perret Enrico Thomae Susumu Kiyoshima Christopher Petit Mehdi Tibouchi Takeshi Koshiba Le Trieu Phong Roberto Trifiletti Veronika Kuchta Bertram Poettering Boaz Tsaban Abishek Joop van de Pol Yiannis Tselekounis Kumarasubramanian Carla R`afols Manolis Tzortzakis Rasmus Winther Ananth Raghunathan Damien Vergnaud Lauritsen Tom Ristenpart Ivan Visconti Chang Min Lee Ben Riva Alfredo Rial Moon Sung Lee Arnab Roy Shota Yamada Nikos Leonardos Katerina Samari Bo-Yin Yang Tancrede Lepoint Alessandra Scafuro Arkady Yerukhimovich Benoˆıt Libert Christian Schaffner Kazuki Yoneyama Huijia (Rachel) Lin Dominique Schroeder Aaram Yun Helger Lipmaa Jacob Schuldt Thomas Zacharias Feng-Hao Liu Sven Sch¨age Mark Zhandry Alex Malozemoff Gil Segev Bingsheng Zhang Takahiro Matsuda Minjae Seo Miaomiao Zhang Alexander May Haya Shulman Hong-Sheng Zhou Sarah Meiklejohn Dale Sibborn PKC Steering Committee Ronald Cramer CWI,Amsterdam&MathematicalInstituteand Leiden University, The Netherlands Yvo Desmedt University of Texas at Dallas, USA Hideki Imai Chuo University and Research Center for Information Security (RCIS), AIST, Japan David Naccache E´cole Normale Sup´erieure, France Tatsuaki Okamoto NTT Labs, Japan David Pointcheval E´cole Normale Sup´erieure, France X PKC 201 Moti Yung (Secretary) Google Inc., and Columbia University, USA Yuliang Zheng (Chair) UniversityofNorthCarolinaatCharlotte,USA Sponsoring Institutions Fundaci´on Sadosky, Argentina IBM Research, USA Microsoft Research, USA Ministry of Science, Technology and Productive Innovation, Argentina Table of Contents Chosen Ciphertext Security Simple Chosen-Ciphertext Security from Low-Noise LPN.............. 1 Eike Kiltz, Daniel Masny, and Krzysztof Pietrzak Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing................................... 19 Baodong Qin and Shengli Liu A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme........................ 37 Dana Dachman-Soled Chosen Ciphertext Security via UCE ............................... 56 Takahiro Matsuda and Goichiro Hanaoka Re-encryption Proxy Re-encryption from Lattices ................................. 77 Elena Kirshanova Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices ........................... 95 Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, and Keita Xagawa Verifiable Outsourcing Verifiable Set Operations over Outsourced Databases ................. 113 Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, and Nikos Triandopoulos Verifiable Oblivious Storage ....................................... 131 Daniel Apon, Jonathan Katz, Elaine Shi, and Aishwarya Thiruvengadam Achieving Privacy in Verifiable Computation with Multiple Servers – Without FHE and without Pre-processing .................. 149 Prabhanjan Ananth, Nishanth Chandran, Vipul Goyal, Bhavana Kanukurthi, and Rafail Ostrovsky

Description:
This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in t
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.