Advances in Cryptology – CRYPTO 2021
Springer International Publishing (Verlag)
978-3-030-84241-3 (ISBN)
The 103 full papers presented in the proceedings were carefully reviewed and selected from a total of 426 submissions. The papers are organized in the following topical sections:
Part I: Award Papers; Signatures; Quantum Cryptography; Succinct Arguments.
Part II: Multi-Party Computation; Lattice Cryptography; and Lattice Cryptanalysis.
Part III: Models; Applied Cryptography and Side Channels; Cryptanalysis; Codes and Extractors; Secret Sharing.
Part IV: Zero Knowledge; Encryption++; Foundations; Low-Complexity Cryptography; Protocols.
Invited Talk.- Which e-voting problems do we need to solve?.- Award Papers.- On the Possibility of Basing Cryptography on EXP6 BPP.- Linear Cryptanalysis of FF3-1 and FEA.- Efficient Key Recovery for all HFE Signature Variants.- Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits.- Signatures.- Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions.- Two-Round Trip Schnorr Multi-Signatures via Delinearized Witnesses.- MuSig2: Simple Two-Round Schnorr Multi-Signatures.- Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for Sigma-Protocols.- DualRing: Generic Construction of Ring Signatures with Efficient Instantiations.- Compact Ring Signatures from Learning With Errors.- Quantum Cryptography.- A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds.- On the Concurrent Composition of Quantum Zero-Knowledge.- Multi-theorem Designated-Verifier NIZK for QMA.- On the Round Complexity of Secure Quantum Computation.- Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort.- One-Way Functions Imply Secure Computation in a Quantum World.- Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits.- New Approaches for Quantum Copy-Protection.- Hidden Cosets and Applications to Unclonable Cryptography.- On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model.- Quantum Collision Attacks on Reduced SHA-256 and SHA-512.- Succinct Arguments.- Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments.- Proof-Carrying Data without Succinct Arguments.- Subquadratic SNARGs in the Random Oracle Model.- Sumcheck Arguments and their Applications.- An Algebraic Framework for Universal and Updatable SNARKs.
Erscheinungsdatum | 10.08.2021 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XV, 805 p. 58 illus., 1 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1225 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Applications • Artificial Intelligence • authentication • ciphertexts • Computer Science • Computer Security • conference proceedings • cryptography • data privacy • Data Security • electronic document identification systems • Encryption • Informatics • Network Protocols • Network Security • Public Key Cryptography • random oracle model • Research • the standard model |
ISBN-10 | 3-030-84241-X / 303084241X |
ISBN-13 | 978-3-030-84241-3 / 9783030842413 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich