Advances in Cryptology – CRYPTO 2021
Springer International Publishing (Verlag)
978-3-030-84258-1 (ISBN)
The 103 full papers presented in the proceedings were carefully reviewed and selected from a total of 426 submissions. The papers are organized in the following topical sections:
Part I: Award Papers; Signatures; Quantum Cryptography; Succinct Arguments.
Part II: Multi-Party Computation; Lattice Cryptography; and Lattice Cryptanalysis.
Part III: Models; Applied Cryptography and Side Channels; Cryptanalysis; Codes and Extractors; Secret Sharing.
Part IV: Zero Knowledge; Encryption++; Foundations; Low-Complexity Cryptography; Protocols.
Zero Knowledge.- Witness Authenticating NIZKs and Applications.- Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs.- Compressing Proofs of k-Out-Of-n Partial Knowledge.- Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions.- Time- and Space-Efficient Arguments from Groups of Unknown Order.- Encryption++.- Broadcast Encryption with Size N1/3 and More from k-Lin.- Fine-grained Secure Attribute-based Encryption.- Multi-Input Quadratic Functional Encryption from Pairings.- Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.- Receiver-Anonymity in Reradomizable RCCA-Secure Cryptosystems Resolved.- Foundations.- White Box Traitor Tracing.- Does Fiat-Shamir Require a Cryptographic Hash Function?.- Composition with Knowledge Assumptions.- Non-Interactive Batch Arguments for NP from Standard Assumptions.- Targeted Lossy Functions and Applications.- The t-wise Independence of Substitution-Permutation Networks.- Low-Complexity Cryptography.- Low-Complexity Weak Pseudorandom Functions in AC0[MOD2].- MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications.- No Time to Hash: On Super-Efficient Entropy Accumulation.- Protocols.- A Logarithmic Lower Bound for Oblivious RAM (for all parameters).- Oblivious RAM with Worst-Case Logarithmic Overhead.- Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time.- Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.- KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange.
Erscheinungsdatum | 10.08.2021 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XV, 732 p. 112 illus., 24 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1128 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Applications • Artificial Intelligence • authentication • ciphertexts • Computer Science • Computer Security • conference proceedings • cryptography • Data Security • electronic document identification systems • Encryption • Formal Logic • Informatics • Microprocessor chips • Network Protocols • Network Security • Public Key Cryptography • Research • Signal Processing • Telecommunication Systems |
ISBN-10 | 3-030-84258-4 / 3030842584 |
ISBN-13 | 978-3-030-84258-1 / 9783030842581 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich