MARC details
| 000 -LEADER |
| fixed length control field |
08124cam a2201081 a 4500 |
| 001 - CONTROL NUMBER |
| control field |
on1153060417 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
OCoLC |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20250707093013.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
| fixed length control field |
m o d |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
cr |n||||||||| |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
200504s2020 sz o 101 0 eng d |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
YDX |
| Language of cataloging |
eng |
| Description conventions |
pn |
| Transcribing agency |
YDX |
| Modifying agency |
GW5XE |
| -- |
OCLCO |
| -- |
DKU |
| -- |
OCLCF |
| -- |
EBLCP |
| -- |
NLW |
| -- |
DCT |
| -- |
EUN |
| -- |
UKMGB |
| -- |
N$T |
| -- |
OCLCO |
| -- |
OCLCQ |
| -- |
COM |
| -- |
OCLCO |
| -- |
OCLCQ |
| -- |
OCLCO |
| -- |
OCLCL |
| -- |
LIP |
| -- |
OCLCO |
| 015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
| National bibliography number |
GBC0H7971 |
| Source |
bnb |
| 016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
| Record control number |
019821279 |
| Source |
Uk |
| 019 ## - |
| -- |
1183470313 |
| -- |
1203987069 |
| -- |
1224754326 |
| -- |
1226263699 |
| -- |
1253563385 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9783030453749 |
| Qualifying information |
(electronic bk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
303045374X |
| Qualifying information |
(electronic bk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| Canceled/invalid ISBN |
3030453731 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| Canceled/invalid ISBN |
9783030453732 |
| 024 7# - OTHER STANDARD IDENTIFIER |
| Standard number or code |
10.1007/978-3-030-45374-9. |
| Source of number or code |
doi |
| 029 1# - (OCLC) |
| OCLC library identifier |
AU@ |
| System control number |
000067130766 |
| 029 1# - (OCLC) |
| OCLC library identifier |
UKMGB |
| System control number |
019821279 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)1153060417 |
| Canceled/invalid control number |
(OCoLC)1183470313 |
| -- |
(OCoLC)1203987069 |
| -- |
(OCoLC)1224754326 |
| -- |
(OCoLC)1226263699 |
| -- |
(OCoLC)1253563385 |
| 037 ## - SOURCE OF ACQUISITION |
| Source of stock number/acquisition |
Springer |
| 050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
GPJ. |
| Source |
bicssc |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM053000. |
| Source |
bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
GPJ. |
| Source |
thema |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
URY. |
| Source |
thema |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8/24 |
| Edition number |
23 |
| 049 ## - LOCAL HOLDINGS (OCLC) |
| Holding library |
MAIN |
| 111 2# - MAIN ENTRY--MEETING NAME |
| Meeting name or jurisdiction name as entry element |
International Workshop on Practice and Theory in Public Key Cryptography |
| Number of part/section/meeting |
(23rd : |
| Date of meeting |
2020 : |
| Location of meeting |
Edinburgh, Scotland) |
| 245 10 - TITLE STATEMENT |
| Title |
Public-key cryptography -- PKC 2020 : |
| Remainder of title |
23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020 proceedings. |
| Number of part/section of a work |
Part I / |
| Statement of responsibility, etc. |
Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas (eds.). |
| 246 3# - VARYING FORM OF TITLE |
| Title proper/short title |
PKC 2020 |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc. |
Cham : |
| Name of publisher, distributor, etc. |
Springer, |
| Date of publication, distribution, etc. |
2020. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
1 online resource |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
computer |
| Media type code |
c |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
online resource |
| Carrier type code |
cr |
| Source |
rdacarrier |
| 347 ## - DIGITAL FILE CHARACTERISTICS |
| File type |
text file |
| 347 ## - DIGITAL FILE CHARACTERISTICS |
| Encoding format |
PDF |
| 490 1# - SERIES STATEMENT |
| Series statement |
Lecture notes in computer science ; |
| Volume/sequential designation |
12110 |
| 490 1# - SERIES STATEMENT |
| Series statement |
LNCS sublibrary, SL 4, Security and Cryptology |
| 500 ## - GENERAL NOTE |
| General note |
International conference proceedings. |
| 500 ## - GENERAL NOTE |
| General note |
Includes author index. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020. The 44 full papers presented were carefully reviewed and selected from 180 submissions. They are organized in topical sections such as: functional encryption; identity-based encryption; obfuscation and applications; encryption schemes; secure channels; basic primitives with special properties; proofs and arguments; lattice-based cryptography; isogeny-based cryptography; multiparty protocols; secure computation and related primitives; post-quantum primitives; and privacy-preserving schemes. -- |
| Assigning source |
Provided by publisher. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Intro -- Preface -- Organization -- How Low Can We Go? (Invited Talk) -- Contents -- Part I -- Contents -- Part II -- Functional Encryption -- Fast, Compact, and Expressive Attribute-Based Encryption -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Design of Our ABE Schemes -- 1.3 Our Main Technique -- 1.4 Other Techniques -- 1.5 Implementation and Evaluation -- 2 Preliminaries -- 2.1 Notation -- 2.2 Basic Tools -- 2.3 Attribute-Based Encryption -- 2.4 Piecewise Guessing Framework -- 2.5 Pebbling Strategy for Boolean Formula -- 3 Our KP-ABE Scheme |
| 505 8# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
3.1 Linear Secret Sharing for Boolean Formulae -- 3.2 Construction -- 3.3 Security -- 4 Adaptive Security for Core Component -- 5 Implementation and Evaluation -- References -- Adaptive Simulation Security for Inner Product Functional Encryption -- 1 Introduction -- 2 Preliminaries -- 2.1 Useful Lemmas -- 2.2 Functional Encryption -- 2.3 Security -- 2.4 Hardness Assumptions -- 3 Adaptive Simulation-Based Security from DDH -- 4 Adaptive Simulation-Based Security for Inner Products over Z from DCR -- 5 Adaptive Simulation-Based Security for Inner Products Mod P from LWE -- 5.1 Construction |
| 505 8# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
5.2 Proof of Security for AdSimIPFE -- References -- Verifiable Inner Product Encryption Scheme -- 1 Introduction -- 1.1 Our Results and Applications -- 1.2 Technical Overview -- 1.3 Related Work and Comparison -- 2 Preliminaries -- 2.1 Building Blocks -- 2.2 Hardness Assumptions -- 3 Our Perfectly Correct Inner-Product Encryption -- 3.1 Security Reduction to DLin and DBDH -- 4 Verifiable Inner-Product Encryption -- 4.1 Our Construction -- 5 NIWI Proofs and Verification Algorithms -- 5.1 How to Handle Generalized or Statements -- 5.2 OR Proof in the General Case |
| 505 8# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
5.3 Master Public Key Verification -- 5.4 Token Verification Algorithms -- 5.5 NIWIenc=""426830A Penc, Venc""526930B : NIWI-Proof for Encryption Algorithm -- 6 Conclusion -- References -- A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials -- 1 Introduction -- 2 Preliminaries -- 2.1 Notations -- 2.2 Pairing Groups -- 2.3 Functional Encryption -- 2.4 Quasi-Adaptive Non-Interactive Zero-Knowledge -- 3 Quadratic FE from Inner-Product FE -- 3.1 Partially Function-Hiding Inner-Product FE -- 3.2 Quadratic FE from Partially Function-Hiding Inner-Product FE |
| 505 8# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
4 Partially-Hiding Inner Product FE -- References -- Identity-Based Encryption -- Master-Key KDM-Secure IBE from Pairings -- 1 Introduction -- 1.1 Our Contributions and Open Problems -- 1.2 General Overview of Our Construction -- 1.3 First Attempt: Dual System Encryption -- 1.4 Final Attempt: Handling Many Challenge Ciphertexts -- 2 Preliminaries -- 2.1 Pairing Groups -- 2.2 Entropy Extraction -- 2.3 Identity Based Encryption -- 3 KDM-Secure IBE from Pairings -- 3.1 Ingredients of Our Construction -- 3.2 KDM-Secure IBE Construction -- 3.3 Concrete Instantiations -- References |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Public key cryptography |
| Form subdivision |
Congresses. |
| 9 (RLIN) |
20798 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 9 (RLIN) |
2191 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Information theory. |
| 9 (RLIN) |
392 |
| 650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer Security |
| 9 (RLIN) |
2191 |
| 650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer Communication Networks |
| 650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Information Theory |
| 9 (RLIN) |
392 |
| 650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computers |
| 9 (RLIN) |
1420 |
| 650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Cryptographie à clé publique |
| Form subdivision |
Congrès. |
| 9 (RLIN) |
26136 |
| 650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Sécurité informatique. |
| 9 (RLIN) |
18600 |
| 650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Théorie de l'information. |
| 9 (RLIN) |
26268 |
| 650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Ordinateurs. |
| 9 (RLIN) |
96685 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
computers. |
| Source of heading or term |
aat |
| 9 (RLIN) |
1420 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| Source of heading or term |
bicssc |
| 9 (RLIN) |
2191 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Network security. |
| Source of heading or term |
bicssc |
| 9 (RLIN) |
723080 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Network hardware. |
| Source of heading or term |
bicssc |
| 9 (RLIN) |
53462 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Coding theory & cryptology. |
| Source of heading or term |
bicssc |
| 9 (RLIN) |
53461 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Information technology: general issues. |
| Source of heading or term |
bicssc |
| 9 (RLIN) |
53629 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computers |
| General subdivision |
Security |
| -- |
General. |
| Source of heading or term |
bisacsh |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computers |
| General subdivision |
Networking |
| -- |
Security. |
| Source of heading or term |
bisacsh |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computers |
| General subdivision |
Hardware |
| -- |
Network Hardware. |
| Source of heading or term |
bisacsh |
| 9 (RLIN) |
53464 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computers |
| General subdivision |
Information Theory. |
| Source of heading or term |
bisacsh |
| 9 (RLIN) |
18190 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computers |
| General subdivision |
Social Aspects |
| -- |
Human-Computer Interaction. |
| Source of heading or term |
bisacsh |
| 9 (RLIN) |
21926 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Public key cryptography |
| Source of heading or term |
fast |
| 9 (RLIN) |
20799 |
| 655 #2 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Congress |
| 9 (RLIN) |
11670 |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
proceedings (reports) |
| Source of term |
aat |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Conference papers and proceedings |
| Source of term |
fast |
| 9 (RLIN) |
6065 |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Conference papers and proceedings. |
| Source of term |
lcgft |
| 9 (RLIN) |
6065 |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Actes de congrès. |
| Source of term |
rvmgf |
| 9 (RLIN) |
609890 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Kiayias, Aggelos. |
| -- |
https://id.oclc.org/worldcat/entity/E39PCjGqPCvHhyqGc8xVRmYxCP |
| 9 (RLIN) |
41558 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Kohlweiss, Markuff. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Wallden, Petros. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Zikas, Vassilis. |
| -- |
https://id.oclc.org/worldcat/entity/E39PCjB7WTFK9xdWdkh477vFPP |
| 9 (RLIN) |
58118 |
| 758 ## - |
| -- |
has work: |
| -- |
Public-key cryptography -- PKC 2020 Part I (Text) |
| -- |
https://id.oclc.org/worldcat/entity/E39PCGVxWHVwDMxfmcJYxQXkwC |
| -- |
https://id.oclc.org/worldcat/ontology/hasWork |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
| Relationship information |
Print version: |
| International Standard Book Number |
3030453731 |
| -- |
9783030453732 |
| Record control number |
(OCoLC)1144874157 |
| 830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
| Uniform title |
Lecture notes in computer science ; |
| Volume number/sequential designation |
12110. |
| 830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
| Uniform title |
LNCS sublibrary. |
| Number of part/section of a work |
SL 4, |
| Name of part/section of a work |
Security and cryptology. |
| 9 (RLIN) |
20708 |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Uniform Resource Identifier |
<a href="https://link.springer.com/10.1007/978-3-030-45374-9">https://link.springer.com/10.1007/978-3-030-45374-9</a> |
| 938 ## - |
| -- |
ProQuest Ebook Central |
| -- |
EBLB |
| -- |
EBL6287220 |
| 938 ## - |
| -- |
EBSCOhost |
| -- |
EBSC |
| -- |
2562595 |
| 938 ## - |
| -- |
YBP Library Services |
| -- |
YANK |
| -- |
16751061 |
| 994 ## - |
| -- |
92 |
| -- |
ATIST |