Advances in Cryptology – ASIACRYPT 2020 -

Advances in Cryptology – ASIACRYPT 2020

26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II

Shiho Moriai, Huaxiong Wang (Herausgeber)

Buch | Softcover
XV, 818 Seiten
2020 | 1st ed. 2020
Springer International Publishing (Verlag)
978-3-030-64833-6 (ISBN)
106,99 inkl. MwSt
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.

The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows:

Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis.

Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange.

Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.

 

Public Key Cryptography.- Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage.- Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions.- Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions.- Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.- Unbounded HIBE with Tight Security.- Multi-Client Oblivious RAM with Poly-Logarithmic Communication.- Privacy-Preserving Pattern Matching on Encrypted Data.- Efficient Homomorphic Comparison Methods with Optimal Complexity.- Lattice-Based Cryptography.- Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings.- Towards Classical Hardness of Module-LWE: The Linear Rank Case.- Lattice-Based E-Cash, Revisited.- Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices.- Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers.- Isogeny-Based Cryptography.- Cryptographic Group Actions and Applications.- B-SIDH: supersingular isogeny Di e-Hellman using twisted torsion.- Calamari and Fala : Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices.- Radical Isogenies.- Oblivious Pseudorandom Functions from Isogenies.- SiGamal: A supersingular isogeny-based PKE and its application to a PRF.- Quantum Algorithms.- Estimating quantum speedups for lattice sieves.- A Combinatorial Approach to Quantum Random Functions.- Improved Classical and Quantum Algorithms for Subset-Sum.- Security Limitations of Classical-Client Delegated Quantum Computing.- Quantum Circuit Implementations of AES with Fewer Qubits.- Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories.- Authenticated Key Exchange.- Fuzzy Asymmetric Password-Authenticated Key Exchange.- Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XV, 818 p. 141 illus., 34 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 1258 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Access Control • Adaptive Algorithms • Applications • authentication • ciphertexts • computer crime • Computer Science • conference proceedings • cryptography • Data Security • electronic document identification systems • Encryption • Informatics • Network Protocols • Network Security • privacy • Public Key Cryptography • public-key encryption • Research • Signal Processing • World Wide Web
ISBN-10 3-030-64833-8 / 3030648338
ISBN-13 978-3-030-64833-6 / 9783030648336
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich