↓ Skip to main content

Public Key Cryptography – PKC 2012

Overview of attention for book
Cover of 'Public Key Cryptography – PKC 2012'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Better Bootstrapping in Fully Homomorphic Encryption
  3. Altmetric Badge
    Chapter 2 Polly Cracker, Revisited, Revisited
  4. Altmetric Badge
    Chapter 3 Ring-LWE in Polynomial Rings
  5. Altmetric Badge
    Chapter 4 On Homomorphic Encryption and Chosen-Ciphertext Security
  6. Altmetric Badge
    Chapter 5 Waters Signatures with Optimal Security Reduction
  7. Altmetric Badge
    Chapter 6 Strong Security from Probabilistic Signature Schemes
  8. Altmetric Badge
    Chapter 7 Space Efficient Signature Schemes from the RSA Assumption
  9. Altmetric Badge
    Chapter 8 The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles
  10. Altmetric Badge
    Chapter 9 Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes
  11. Altmetric Badge
    Chapter 10 Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited
  12. Altmetric Badge
    Chapter 11 Public-Key Identification Schemes Based on Multivariate Cubic Polynomials
  13. Altmetric Badge
    Chapter 12 Public-Key Cryptography from New Multivariate Quadratic Assumptions
  14. Altmetric Badge
    Chapter 13 Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
  15. Altmetric Badge
    Chapter 14 Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
  16. Altmetric Badge
    Chapter 15 Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication
  17. Altmetric Badge
    Chapter 16 Public Key Encryption against Related Key Attacks
  18. Altmetric Badge
    Chapter 17 Public Key Cryptography – PKC 2012
  19. Altmetric Badge
    Chapter 18 Variants of Waters’ Dual System Primitives Using Asymmetric Pairings
  20. Altmetric Badge
    Chapter 19 From Selective to Full Security: Semi-generic Transformations in the Standard Model
  21. Altmetric Badge
    Chapter 20 Circular and KDM Security for Identity-Based Encryption
  22. Altmetric Badge
    Chapter 21 NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
  23. Altmetric Badge
    Chapter 22 Generating Provable Primes Efficiently on Embedded Devices
  24. Altmetric Badge
    Chapter 23 Password-Based Authenticated Key Exchange
  25. Altmetric Badge
    Chapter 24 Constant-Round Multi-party Private Set Union Using Reversed Laurent Series
  26. Altmetric Badge
    Chapter 25 Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
  27. Altmetric Badge
    Chapter 26 Efficiently Shuffling in Public
  28. Altmetric Badge
    Chapter 27 Efficient Password Authenticated Key Exchange via Oblivious Transfer
  29. Altmetric Badge
    Chapter 28 Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
  30. Altmetric Badge
    Chapter 29 Relatively-Sound NIZKs and Password-Based Key-Exchange
  31. Altmetric Badge
    Chapter 30 Multi-location Leakage Resilient Cryptography
  32. Altmetric Badge
    Chapter 31 On Definitions of Selective Opening Security
  33. Altmetric Badge
    Chapter 32 New Definitions and Separations for Circular Security
  34. Altmetric Badge
    Chapter 33 Correlated Product Security from Any One-Way Function
  35. Altmetric Badge
    Chapter 34 Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms
  36. Altmetric Badge
    Chapter 35 Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve
  37. Altmetric Badge
    Chapter 36 Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith’s Methods
  38. Altmetric Badge
    Chapter 37 Extended-DDH and Lossy Trapdoor Functions
  39. Altmetric Badge
    Chapter 38 DDH-Like Assumptions Based on Extension Rings
  40. Altmetric Badge
    Chapter 39 Security of Blind Signatures Revisited
  41. Altmetric Badge
    Chapter 40 Efficient Network Coding Signatures in the Standard Model
  42. Altmetric Badge
    Chapter 41 Improved Security for Linearly Homomorphic Signatures: A Generic Framework
  43. Altmetric Badge
    Chapter 42 On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
Attention for Chapter 15: Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication
Altmetric Badge

About this Attention Score

  • Average Attention Score compared to outputs of the same age
  • Above-average Attention Score compared to outputs of the same age and source (58th percentile)

Mentioned by

twitter
3 X users

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
44 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication
Chapter number 15
Book title
Public Key Cryptography – PKC 2012
Published in
Lecture notes in computer science, January 2012
DOI 10.1007/978-3-642-30057-8_15
Book ISBNs
978-3-64-230056-1, 978-3-64-230057-8
Authors

Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro

Editors

Marc Fischlin, Johannes Buchmann, Mark Manulis

X Demographics

X Demographics

The data shown below were collected from the profiles of 3 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 44 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Japan 1 2%
Unknown 43 98%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 13 30%
Student > Master 9 20%
Researcher 6 14%
Student > Postgraduate 3 7%
Lecturer 3 7%
Other 7 16%
Unknown 3 7%
Readers by discipline Count As %
Computer Science 33 75%
Engineering 3 7%
Physics and Astronomy 2 5%
Mathematics 1 2%
Design 1 2%
Other 0 0%
Unknown 4 9%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 3. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 26 June 2013.
All research outputs
#13,374,110
of 23,577,761 outputs
Outputs from Lecture notes in computer science
#3,811
of 8,140 outputs
Outputs of similar age
#146,682
of 247,793 outputs
Outputs of similar age from Lecture notes in computer science
#196
of 489 outputs
Altmetric has tracked 23,577,761 research outputs across all sources so far. This one is in the 42nd percentile – i.e., 42% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,140 research outputs from this source. They typically receive a little more attention than average, with a mean Attention Score of 5.1. This one has gotten more attention than average, scoring higher than 51% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 247,793 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 40th percentile – i.e., 40% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 489 others from the same source and published within six weeks on either side of this one. This one has gotten more attention than average, scoring higher than 58% of its contemporaries.