Description |
1 online resource |
Series |
Lecture notes in computer science ; 12111 |
|
LNCS sublibrary, SL 4, Security and Cryptology |
|
Lecture notes in computer science ; 12111.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Intro -- Preface -- Organization -- Contents -- Part II -- Contents -- Part I -- Lattice-Based Cryptography -- The Randomized Slicer for CVPP: Sharper, Faster, Smaller, Batchier -- 1 Introduction -- 1.1 Contributions -- 1.2 Working Heuristics -- 2 Preliminaries -- 2.1 Notation -- 2.2 Spherical Geometry -- 2.3 Lattices -- 2.4 Solving CVPP with the Randomized Slicer -- 3 The Random Walk Model -- 4 Numerical Approximations -- 4.1 Discretization -- 4.2 Convex Optimization -- 4.3 Numerical Results -- 5 An Exact Solution for the Randomized Slicer -- 6 Memoryless Nearest Neighbour Searching |
|
7 Bounded Distance Decoding with Preprocessing -- 8 Application to Graph-Based NNS -- References -- Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes -- 1 Introduction -- 1.1 Comparison with NIST Round2 Lattice-Based PKEs/KEMs -- 1.2 Comparison with NIST Round2 Lattice-Based Signatures -- 1.3 Organizations -- 2 Preliminaries -- 2.1 Notation -- 2.2 Definitions -- 2.3 High/Low Order Bits and Hints -- 3 An Improved KEM from AMLWE -- 3.1 Design Rationale -- 3.2 The Construction -- 3.3 Provable Security -- 3.4 Choices of Parameters |
|
4 An Improved Signature from AMLWE and AMSIS -- 4.1 Design Rationale -- 4.2 The Construction -- 4.3 Provable Security -- 4.4 Choices of Parameters -- 5 Known Attacks Against AMLWE and AMSIS -- 5.1 Concrete Security of KEM -- 5.2 Concrete Security of SIG -- A Definitions of Hard Problems -- References -- MPSign: A Signature from Small-Secret Middle-Product Learning with Errors -- 1 Introduction -- 1.1 Contributions -- 1.2 Comparison with Prior Works -- 2 Preliminaries -- 2.1 Polynomials and Matrices -- 2.2 Gaussian Distributions -- 2.3 Polynomial and Middle-Product Learning with Errors |
|
2.4 Cryptographic Definitions -- 3 Hardness of Middle-Product LWE with Small Secrets -- 4 An Attack on Inhomogeneous PSIS with Small Secrets -- 5 A Signature Scheme Based on Small Secrets MPLWE -- 5.1 The Identification Scheme -- 5.2 The Signature Scheme -- 6 Concrete Parameters -- 7 Implementation -- References -- Proofs and Arguments II -- Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control -- 1 Introduction -- 1.1 Our Witness Indistinguishability Transformation -- 1.2 Application: Succinct Single-Round Access Control |
|
1.3 Technical Overview of Our WI Transformation -- 2 Witness Indistinguishability for Any Argument System -- 2.1 Preliminaries -- 2.2 Private Remote Evaluation -- 2.3 Making Single-Round Protocols Witness Indistinguishable -- 3 Succinct Single-Round Access Control Scheme -- 3.1 Delegation for Batch-NP Families -- 3.2 Known Batch Delegation Schemes -- 3.3 Our Scheme -- 3.4 Proof of Theorem 3.7 for Our Construction -- References -- Boosting Verifiable Computation on Encrypted Data -- 1 Introduction -- 1.1 Ensuring Correctness of Privacy-Preserving Computation -- 1.2 Our Contributions |
Summary |
The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020. The 44 full papers presented were carefully reviewed and selected from 180 submissions. They are organized in topical sections such as: functional encryption; identity-based encryption; obfuscation and applications; encryption schemes; secure channels; basic primitives with special properties; proofs and arguments; lattice-based cryptography; isogeny-based cryptography; multiparty protocols; secure computation and related primitives; post-quantum primitives; and privacy-preserving schemes. -- Provided by publisher |
Notes |
Includes author index |
|
International conference proceedings |
Subject |
Public key cryptography -- Congresses
|
|
Computer security.
|
|
Network security.
|
|
Information technology: general issues.
|
|
Network hardware.
|
|
Computer networking & communications.
|
|
Computers -- Security -- General.
|
|
Computers -- Networking -- Security.
|
|
Computers -- Social Aspects -- Human-Computer Interaction.
|
|
Computers -- Hardware -- Network Hardware.
|
|
Computers -- Networking -- General.
|
|
Public key cryptography
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Kiayias, Aggelos.
|
|
Kohlweiss, Markuff
|
|
Wallden, Petros
|
|
Zikas, Vassilis.
|
ISBN |
9783030453886 |
|
303045388X |
|