Theory of Cryptography
Springer International Publishing (Verlag)
978-3-030-36032-0 (ISBN)
The 43 full papers presented were carefully reviewed and selected from 147 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
Succinct Arguments in the Quantum Random Oracle Model.- Delegating Quantum Computation in the Quantum Random Oracle Model.- Tighter proofs of CCA security in the quantum random oracle model.- Attribute Based Encryption for Deterministic Finite Automata from DLIN.- CPA-to-CCA Transformation for KDM Security.- New Approaches to Traitor Tracing with Embedded Identities.- A Unified and Composable Take on Ratcheting.- Continuously Non-Malleable Secret Sharing for General Access Structures.- Interactive Non-Malleable Codes.- Stronger Lower Bounds for Online ORAM.- Adaptively Secure Garbling Schemes for Parallel Computations.- Statistical Difference Beyond the Polarizing Regime.- Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions & Hardness.- Fully Homomorphic NIZK and NIWI Proofs.- Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND.- Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles.- Compressible FHE with Applications to PIR.- Permuted Puzzles and Cryptographic Hardness.- Linear-Size Constant-Query IOPs for Delegating Computation.- On the (In)security of Kilian-Based SNARGs.- Incrementally Verifiable Computation via Incremental PCPs.
Erscheinungsdatum | 26.11.2019 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 578 p. 565 illus., 7 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 896 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Applications • authentication • ciphertexts • Communication • Computer Networks • Computer Science • Computer Security • Computer systems • conference proceedings • cryptography • data privacy • Data Security • electronic document identification systems • Encryption • Engineering • Informatics • Internet • Mathematics • Network Protocols • Network Security • privacy • Public Key Cryptography • Research • Telecommunication Systems |
ISBN-10 | 3-030-36032-6 / 3030360326 |
ISBN-13 | 978-3-030-36032-0 / 9783030360320 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich