Limit search to available items
Book Cover
E-book
Author International Workshop on Practice and Theory in Public Key Cryptography (23rd : 2020 : Edinburgh, Scotland)

Title Public-key cryptography -- PKC 2020 : 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020 proceedings. Part II / Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas (eds.)
Published Cham : Springer, 2020

Copies

Description 1 online resource
Series Lecture notes in computer science ; 12111
LNCS sublibrary, SL 4, Security and Cryptology
Lecture notes in computer science ; 12111.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro -- Preface -- Organization -- Contents -- Part II -- Contents -- Part I -- Lattice-Based Cryptography -- The Randomized Slicer for CVPP: Sharper, Faster, Smaller, Batchier -- 1 Introduction -- 1.1 Contributions -- 1.2 Working Heuristics -- 2 Preliminaries -- 2.1 Notation -- 2.2 Spherical Geometry -- 2.3 Lattices -- 2.4 Solving CVPP with the Randomized Slicer -- 3 The Random Walk Model -- 4 Numerical Approximations -- 4.1 Discretization -- 4.2 Convex Optimization -- 4.3 Numerical Results -- 5 An Exact Solution for the Randomized Slicer -- 6 Memoryless Nearest Neighbour Searching
7 Bounded Distance Decoding with Preprocessing -- 8 Application to Graph-Based NNS -- References -- Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes -- 1 Introduction -- 1.1 Comparison with NIST Round2 Lattice-Based PKEs/KEMs -- 1.2 Comparison with NIST Round2 Lattice-Based Signatures -- 1.3 Organizations -- 2 Preliminaries -- 2.1 Notation -- 2.2 Definitions -- 2.3 High/Low Order Bits and Hints -- 3 An Improved KEM from AMLWE -- 3.1 Design Rationale -- 3.2 The Construction -- 3.3 Provable Security -- 3.4 Choices of Parameters
4 An Improved Signature from AMLWE and AMSIS -- 4.1 Design Rationale -- 4.2 The Construction -- 4.3 Provable Security -- 4.4 Choices of Parameters -- 5 Known Attacks Against AMLWE and AMSIS -- 5.1 Concrete Security of KEM -- 5.2 Concrete Security of SIG -- A Definitions of Hard Problems -- References -- MPSign: A Signature from Small-Secret Middle-Product Learning with Errors -- 1 Introduction -- 1.1 Contributions -- 1.2 Comparison with Prior Works -- 2 Preliminaries -- 2.1 Polynomials and Matrices -- 2.2 Gaussian Distributions -- 2.3 Polynomial and Middle-Product Learning with Errors
2.4 Cryptographic Definitions -- 3 Hardness of Middle-Product LWE with Small Secrets -- 4 An Attack on Inhomogeneous PSIS with Small Secrets -- 5 A Signature Scheme Based on Small Secrets MPLWE -- 5.1 The Identification Scheme -- 5.2 The Signature Scheme -- 6 Concrete Parameters -- 7 Implementation -- References -- Proofs and Arguments II -- Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control -- 1 Introduction -- 1.1 Our Witness Indistinguishability Transformation -- 1.2 Application: Succinct Single-Round Access Control
1.3 Technical Overview of Our WI Transformation -- 2 Witness Indistinguishability for Any Argument System -- 2.1 Preliminaries -- 2.2 Private Remote Evaluation -- 2.3 Making Single-Round Protocols Witness Indistinguishable -- 3 Succinct Single-Round Access Control Scheme -- 3.1 Delegation for Batch-NP Families -- 3.2 Known Batch Delegation Schemes -- 3.3 Our Scheme -- 3.4 Proof of Theorem 3.7 for Our Construction -- References -- Boosting Verifiable Computation on Encrypted Data -- 1 Introduction -- 1.1 Ensuring Correctness of Privacy-Preserving Computation -- 1.2 Our Contributions
Summary The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020. The 44 full papers presented were carefully reviewed and selected from 180 submissions. They are organized in topical sections such as: functional encryption; identity-based encryption; obfuscation and applications; encryption schemes; secure channels; basic primitives with special properties; proofs and arguments; lattice-based cryptography; isogeny-based cryptography; multiparty protocols; secure computation and related primitives; post-quantum primitives; and privacy-preserving schemes. -- Provided by publisher
Notes Includes author index
International conference proceedings
Subject Public key cryptography -- Congresses
Computer security.
Network security.
Information technology: general issues.
Network hardware.
Computer networking & communications.
Computers -- Security -- General.
Computers -- Networking -- Security.
Computers -- Social Aspects -- Human-Computer Interaction.
Computers -- Hardware -- Network Hardware.
Computers -- Networking -- General.
Public key cryptography
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Kiayias, Aggelos.
Kohlweiss, Markuff
Wallden, Petros
Zikas, Vassilis.
ISBN 9783030453886
303045388X
Other Titles PKC 2020