Advances in Cryptology – ASIACRYPT 2020
Springer International Publishing (Verlag)
978-3-030-64833-6 (ISBN)
The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows:
Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis.
Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange.
Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.
Public Key Cryptography.- Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage.- Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions.- Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions.- Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.- Unbounded HIBE with Tight Security.- Multi-Client Oblivious RAM with Poly-Logarithmic Communication.- Privacy-Preserving Pattern Matching on Encrypted Data.- Efficient Homomorphic Comparison Methods with Optimal Complexity.- Lattice-Based Cryptography.- Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings.- Towards Classical Hardness of Module-LWE: The Linear Rank Case.- Lattice-Based E-Cash, Revisited.- Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices.- Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers.- Isogeny-Based Cryptography.- Cryptographic Group Actions and Applications.- B-SIDH: supersingular isogeny Di e-Hellman using twisted torsion.- Calamari and Fala : Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices.- Radical Isogenies.- Oblivious Pseudorandom Functions from Isogenies.- SiGamal: A supersingular isogeny-based PKE and its application to a PRF.- Quantum Algorithms.- Estimating quantum speedups for lattice sieves.- A Combinatorial Approach to Quantum Random Functions.- Improved Classical and Quantum Algorithms for Subset-Sum.- Security Limitations of Classical-Client Delegated Quantum Computing.- Quantum Circuit Implementations of AES with Fewer Qubits.- Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories.- Authenticated Key Exchange.- Fuzzy Asymmetric Password-Authenticated Key Exchange.- Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security.
Erscheinungsdatum | 04.01.2021 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XV, 818 p. 141 illus., 34 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1258 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • Adaptive Algorithms • Applications • authentication • ciphertexts • computer crime • Computer Science • conference proceedings • cryptography • Data Security • electronic document identification systems • Encryption • Informatics • Network Protocols • Network Security • privacy • Public Key Cryptography • public-key encryption • Research • Signal Processing • World Wide Web |
ISBN-10 | 3-030-64833-8 / 3030648338 |
ISBN-13 | 978-3-030-64833-6 / 9783030648336 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich