Limit search to available items
Book Cover
E-book
Author CRYPTO (Conference) (33rd : 2013 : Santa Barbara, Calif.)

Title Advances in cryptology : CRYPTO 2013 : 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18-22, 2013, proceedings, Part II / Ran Canetti, Juan A. Garay (eds.)
Published Heidelberg : Springer, [2013]
©2013

Copies

Description 1 online resource (xvii, 556 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 8043
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 8043
LNCS sublibrary. SL 4, Security and cryptology
Contents Session 11: Implementation-Oriented Protocols. Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries / Yehuda Lindell -- Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose / Yan Huang, Jonathan Katz, David Evans -- Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation / Payman Mohassel, Ben Riva -- Improved OT Extension for Transferring Short Secrets / Vladimir Kolesnikov, Ranjit Kumaresan -- Time-Optimal Interactive Proofs for Circuit Evaluation / Justin Thaler -- SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge / Eli Ben-Sasson ... et al. -- Invited Talk: Why the Web Still Runs on RC4
Session 12: Number-Theoretic Hardness. On the Function Field Sieve and the Impact of Higher Splitting Probabilities / Faruk Göloğlu ... et al. -- An Algebraic Framework for Diffie-Hellman Assumptions / Alex Escala ... et al. -- rHard-Core Predicates for a Diffie-Hellman Problem over Finite Fields / Nelly Fazio ... et al
Session 13: MPC -- Foundations. Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys / Benny Applebaum ... et al. -- Efficient Multiparty Protocols via Log-Depth Threshold Formulae / Gil Cohen ... et al. -- A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation / Martin Hirt, Ueli Maurer, Christoph Lucas -- What Information Is Leaked under Concurrent Composition? / Vipul Goyal, Divya Gupta, Abhishek Jain
Session 14: Codes and Secret Sharing. Non-malleable Codes from Two-Source Extractors / Stefan Dziembowski, Tomasz Kazana, Maciej Obremski -- Optimal Coding for Streaming Authentication and Interactive Communication / Matthew Franklin ... et al. -- Secret Sharing, Rank Inequalities and Information Inequalities / Sebastià Martín, Carles Padró, An Yang
Session 15: Signatures and Authentication. Linearly Homomorphic Structure-Preserving Signatures and Their Applications / Benoît Libert ... et al. -- Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs / Vadim Lyubashevsky, Daniel Masny
Session 16: Quantum Security. Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling / Frédéric Dupuis, Omar Fawzi, Stephanie Wehner -- Quantum One-Time Programs / Anne Broadbent, Gus Gutoski, Douglas Stebila -- Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World / Dan Boneh, Mark Zhandry -- Everlasting Multi-party Computation / Dominique Unruh
Session 17: New Primitives. -- Instantiating Random Oracles via UCEs / Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi -- Obfuscating Conjunctions / Zvika Brakerski, Guy N. Rothblum
Session 18: Functional Encryption I. Fully, (Almost) Tightly Secure IBE and Dual System Groups / Jie Chen, Hoeteck Wee -- Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption / Dan Boneh, Ananth Raghunathan, Gil Segev -- Attribute-Based Encryption for Circuits from Multilinear Maps / Sanjam Garg ... et al
Session 19: Functional Encryption II. Functional Encryption: New Perspectives and Lower Bounds / Shweta Agrawal ... et al. -- On the Achievability of Simulation-Based Security for Functional Encryption / Angelo De Caro ... et al. -- How to Run Turing Machines on Encrypted Data / Shafi Goldwasser ... et al
Implementation-Oriented Protocols -- Number-Theoretic Hardness -- MPC-Foundations -- Codes and Secret Sharing -- Signatures and Authentication -- Quantum Security -- New Primitives -- Functional Encryption
Summary The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption
Bibliography Includes bibliographical references and author index
Notes Print version record
In (MP) Advances in cryptology nnam
Subject Computers -- Access control -- Congresses
Computer security -- Congresses
Cryptography -- Congresses
Computer security.
Computer Security
Computer security
Computers -- Access control
Cryptography
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Canetti, Ran, editor
Garay, Juan A., editor
International Association for Cryptologic Research, sponsoring body
ISBN 9783642400841
3642400841