PKC 2019:
Kazue Sako and Dongdai Lin (Eds.):
Public Key Cryptography, PKC 2019,
April 14-17, 2019
Beijing, China
Proceedings.
Crypto database info for PKC 2019
Organizational Committee
Program Chairs:
General Chair:
General Chair:
Kazue Sako and Dongdai Lin
Xiaoyun Wang
Xiaoyun Wang
Program Committee
Erdem Alkim
Diego F. Aranha
Chris Brzuska
Dario Catalano
Nishanth Chandran
Sanjit Chatterjee
Jie Chen
Jung Hee Cheon
Craig Costello
Nico Döttling
Yi Deng
Leo Ducas
Dario Fiore
Pierre-Alain Fouque
Feng Hao
Tibor Jager
Marc Joye
Tancrède Lepoint
Benoît Libert
Helger Lipmaa
Feng-Hao Liu
Takahiro Matsuda
Pratyay Mukherjee
Satoshi Obana
Miyako Okubo
Arpita Patra
Ludovic Perret
Thomas Peters
Benny Pinkas
Bertram Poettering
Antigoni Polychroniadou
Alessandra Scafuro
Jae Hong Seo
Qiang Tang
Huaxiong Wang
Yu Yu
- Invited Talk A Decade of Dual Pairing Vector Spaces, by Tatsuaki Okamoto
- Cryptographic Protocols
- Digital Signatures
- Shorter Ring Signatures from Standard Assumptions, 99-126, Alonso González
bib info - Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs, 127-158, Tatsuaki Okamoto, Katsuyuki Takashima, Pratish Datta
bib info - Efficient Invisible and Unlinkable Sanitizable Signatures, 159-189, Russell W. F. Lai, Giulio Malavolta, Pascal Lafourcade, Dominique Schröder, Xavier Bultel, Sri Aravinda Krishnan Thyagarajan
bib info - Group Signatures with Selective Linkability, 190-220, Anja Lehmann, Lydia Garms
bib info - Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog, 221-251, Moti Yung, Alexander Russell, Sherman S. M. Chow, Qiang Tang, Hong-Sheng Zhou, Yongjun Zhao
bib info
- Shorter Ring Signatures from Standard Assumptions, 99-126, Alonso González
- Zero-Knowledge
- Zero-Knowledge Elementary Databases with More Expressive Queries, 255-285, Benoît Libert, Huaxiong Wang, Khoa Nguyen, Benjamin Hong Meng Tan
bib info - Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup, 286-313, Amir Herzberg, Michael Backes, Aniket Kate, Ivan Pryvalov, Lucjan Hanzlik
bib info - Shorter Quadratic QA-NIZK Proofs, 314-343, Vanesa Daza, Alonso González, Javier Silva, Carla Ràfols, Zaira Pindado
bib info - Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts, 344-373, Vadim Lyubashevsky, Gregor Seiler, Rafael del Pino
bib info - Publicly Verifiable Proofs from Blockchains, 374-401, Ivan Visconti, Alessandra Scafuro, Luisa Siniscalchi
bib info
- Zero-Knowledge Elementary Databases with More Expressive Queries, 255-285, Benoît Libert, Huaxiong Wang, Khoa Nguyen, Benjamin Hong Meng Tan
- Identity-Based Encryption
- Identity-Based Broadcast Encryption with Efficient Revocation, 405-435, Puwen Wei, Aijun Ge
bib info - Tightly Secure Hierarchical Identity-Based Encryption, 436-465, Jiaxin Pan, Roman Langrehr
bib info - Leakage-Resilient Identity-Based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio, 466-495, Ryo Nishimaki, Takashi Yamakawa
bib info - Additively Homomorphic IBE from Higher Residuosity, 496-515, Michael Clear, Ciaran McGoldrick
bib info
- Identity-Based Broadcast Encryption with Efficient Revocation, 405-435, Puwen Wei, Aijun Ge
- Fundamental Primitives (I)
- Upper and Lower Bounds for Continuous Non-Malleable Codes, 519-548, Dana Dachman-Soled, Mukul Kulkarni
bib info - Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions, 549-580, Goichiro Hanaoka, Takahiro Matsuda, Kenta Takahashi, Takao Murakami
bib info - On Tightly Secure Primitives in the Multi-instance Setting, 581-611, Dennis Hofheinz, Ngoc Khanh Nguyen
bib info
- Upper and Lower Bounds for Continuous Non-Malleable Codes, 519-548, Dana Dachman-Soled, Mukul Kulkarni
- Public Key Encryptions
- Collusion Resistant Broadcast and Trace from Positional Witness Encryption, 3-33, Brent Waters, Rishab Goyal, Satyanarayana Vusirikala
bib info - Break-glass Encryption, 34-62, Alessandra Scafuro
bib info - Registration-Based Encryption from Standard Assumptions, 63-93, Sanjam Garg, Mohammad Mahmoody, Mohammad Hajiabadi, Sruthi Sekar, Ahmadreza Rahimi
bib info
- Collusion Resistant Broadcast and Trace from Positional Witness Encryption, 3-33, Brent Waters, Rishab Goyal, Satyanarayana Vusirikala
- Functional Encryption
- FE for Inner Products and Its Application to Decentralized ABE, 97-127, Feng-Hao Liu, Xiong Fan, Zhedong Wang
bib info - Decentralizing Inner-Product Functional Encryption, 128-157, Michel Abdalla, Markulf Kohlweiss, Fabrice Benhamouda, Hendrik Waldner
bib info - Non-zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR, 158-188, Shota Yamada, Shuichi Katsumata
bib info - Function Private Predicate Encryption for Low Min-Entropy Predicates, 189-219, Debdeep Mukhopadhyay, Somindu C. Ramanna, Sikhar Patranabis
bib info
- FE for Inner Products and Its Application to Decentralized ABE, 97-127, Feng-Hao Liu, Xiong Fan, Zhedong Wang
- Obfuscation based Cryptography & Re-encryption Schemes
- Adaptively Single-Key Secure Constrained PRFs for NC1, 223-253, Nuttapong Attrapadung, Ryo Nishimaki, Shota Yamada, Takahiro Matsuda, Takashi Yamakawa
bib info - Obfuscating Simple Functionalities from Knowledge Assumptions, 254-283, Hoeteck Wee, Ward Beullens
bib info - What About Bob? The Inadequacy of CPA Security for Proxy Reencryption, 287-316, Aloni Cohen
bib info - Adaptively Secure Proxy Re-encryption, 317-346, Krzysztof Pietrzak, Georg Fuchsbauer, Chethan Kamath, Karen Klein
bib info
- Adaptively Single-Key Secure Constrained PRFs for NC1, 223-253, Nuttapong Attrapadung, Ryo Nishimaki, Shota Yamada, Takahiro Matsuda, Takashi Yamakawa
- Fundamental Primitives (II)
- Generic Constructions of Robustly Reusable Fuzzy Extractor, 349-378, Shengli Liu, Dawu Gu, Yunhua Wen
bib info - Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation, 379-407, Steven D. Galbraith, Kenneth G. Paterson, Jake Massimo
bib info - Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs, 408-437, Lisa Kohl
bib info
- Generic Constructions of Robustly Reusable Fuzzy Extractor, 349-378, Shengli Liu, Dawu Gu, Yunhua Wen
- Post Quantum Cryptography (I)
- Lattice-Based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance, 441-471, Takahiro Matsuda, Atsushi Takayasu, Shuichi Katsumata
bib info - Towards Non-Interactive Zero-Knowledge for NP from LWE, 472-503, Ron D. Rothblum, Adam Sealfon, Katerina Sotiraki
bib info - More Efficient Algorithms for the NTRU Key Generation Using the Field Norm, 504-533, Thomas Pornin, Thomas Prest
bib info - Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto, 534-564, Tim Güneysu, Tobias Oder, Tobias Schneider, Clara Paglialonga
bib info
- Lattice-Based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance, 441-471, Takahiro Matsuda, Atsushi Takayasu, Shuichi Katsumata
- Post Quantum Cryptography (II)
- Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes, 565-598, Thomas Johansson, Ingrid Verbauwhede, Frederik Vercauteren, Qian Guo, Alexander Nilsson, Jan-Pieter D'Anvers
bib info - Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model, 618-645, Zhenfeng Zhang, Zhi Ma, Haodong Jiang
bib info - Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations, 599-617, Chaoping Xing, Sze Ling Yeo, Zhe Li
bib info - Factoring Products of Braids via Garside Normal Form, 646-678, Christophe Petit, Simon-Philipp Merz
bib info
- Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes, 565-598, Thomas Johansson, Ingrid Verbauwhede, Frederik Vercauteren, Qian Guo, Alexander Nilsson, Jan-Pieter D'Anvers