Description |
1 online resource (xvii, 556 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 8043 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 8043
|
|
LNCS sublibrary. SL 4, Security and cryptology
|
Contents |
Session 11: Implementation-Oriented Protocols. Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries / Yehuda Lindell -- Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose / Yan Huang, Jonathan Katz, David Evans -- Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation / Payman Mohassel, Ben Riva -- Improved OT Extension for Transferring Short Secrets / Vladimir Kolesnikov, Ranjit Kumaresan -- Time-Optimal Interactive Proofs for Circuit Evaluation / Justin Thaler -- SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge / Eli Ben-Sasson ... et al. -- Invited Talk: Why the Web Still Runs on RC4 |
|
Session 12: Number-Theoretic Hardness. On the Function Field Sieve and the Impact of Higher Splitting Probabilities / Faruk Göloğlu ... et al. -- An Algebraic Framework for Diffie-Hellman Assumptions / Alex Escala ... et al. -- rHard-Core Predicates for a Diffie-Hellman Problem over Finite Fields / Nelly Fazio ... et al |
|
Session 13: MPC -- Foundations. Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys / Benny Applebaum ... et al. -- Efficient Multiparty Protocols via Log-Depth Threshold Formulae / Gil Cohen ... et al. -- A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation / Martin Hirt, Ueli Maurer, Christoph Lucas -- What Information Is Leaked under Concurrent Composition? / Vipul Goyal, Divya Gupta, Abhishek Jain |
|
Session 14: Codes and Secret Sharing. Non-malleable Codes from Two-Source Extractors / Stefan Dziembowski, Tomasz Kazana, Maciej Obremski -- Optimal Coding for Streaming Authentication and Interactive Communication / Matthew Franklin ... et al. -- Secret Sharing, Rank Inequalities and Information Inequalities / Sebastià Martín, Carles Padró, An Yang |
|
Session 15: Signatures and Authentication. Linearly Homomorphic Structure-Preserving Signatures and Their Applications / Benoît Libert ... et al. -- Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs / Vadim Lyubashevsky, Daniel Masny |
|
Session 16: Quantum Security. Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling / Frédéric Dupuis, Omar Fawzi, Stephanie Wehner -- Quantum One-Time Programs / Anne Broadbent, Gus Gutoski, Douglas Stebila -- Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World / Dan Boneh, Mark Zhandry -- Everlasting Multi-party Computation / Dominique Unruh |
|
Session 17: New Primitives. -- Instantiating Random Oracles via UCEs / Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi -- Obfuscating Conjunctions / Zvika Brakerski, Guy N. Rothblum |
|
Session 18: Functional Encryption I. Fully, (Almost) Tightly Secure IBE and Dual System Groups / Jie Chen, Hoeteck Wee -- Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption / Dan Boneh, Ananth Raghunathan, Gil Segev -- Attribute-Based Encryption for Circuits from Multilinear Maps / Sanjam Garg ... et al |
|
Session 19: Functional Encryption II. Functional Encryption: New Perspectives and Lower Bounds / Shweta Agrawal ... et al. -- On the Achievability of Simulation-Based Security for Functional Encryption / Angelo De Caro ... et al. -- How to Run Turing Machines on Encrypted Data / Shafi Goldwasser ... et al |
|
Implementation-Oriented Protocols -- Number-Theoretic Hardness -- MPC-Foundations -- Codes and Secret Sharing -- Signatures and Authentication -- Quantum Security -- New Primitives -- Functional Encryption |
Summary |
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption |
Bibliography |
Includes bibliographical references and author index |
Notes |
Print version record |
In |
(MP) Advances in cryptology nnam |
Subject |
Computers -- Access control -- Congresses
|
|
Computer security -- Congresses
|
|
Cryptography -- Congresses
|
|
Computer security.
|
|
Computer Security
|
|
Computer security
|
|
Computers -- Access control
|
|
Cryptography
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Canetti, Ran, editor
|
|
Garay, Juan A., editor
|
|
International Association for Cryptologic Research, sponsoring body
|
ISBN |
9783642400841 |
|
3642400841 |
|