Limit search to available items
Book Cover
E-book
Author International Conference on the Theory and Application of Cryptology and Information Security (17th : 2011 : Seoul, Korea)

Title Advances in cryptology-- ASIACRYPT 2011 : 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011, proceedings / edited by Dong Hoon Lee, Xiaoyun Wang
Published Berlin ; New York : Springer, ©2011

Copies

Description 1 online resource (xiv, 760 pages)
Series Lecture notes in computer science, 0302-9743 ; 7073
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7073.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro; Title; Preface; Table of Contents; Lattices and Quantum Cryptography; BKZ 2.0: Better Lattice Security Estimates; Introduction; Preliminaries; The Blockwise Korkine-Zolotarev (BKZ) Algorithm; Description; Enumeration Subroutine; Analysis; BKZ 2.0; Sound Pruning; Preprocessing of Local Blocks; Optimizing the Enumeration Radius; New Lattice Records; Darmstadt's Lattice Challenge; SVP Challenges; Predicting BKZ 2.0 by Simulation; Description; Consistency with Experiments; Enumeration Subroutine; Revising Security Estimates; NTRU Lattices
Gentry-Halevi's Fully-Homomorphic Encryption ChallengesReferences; Functional Encryption for Inner Product Predicates from Learning with Errors; Introduction; Overview of the Construction; Predicate Encryption; Security; Lattice Preliminaries; Lattices; Sampling Algorithms; The LWE Problem; A Functional Encryption Scheme for Inner Product Predicates; The Construction; Correctness; Security; Parameter Selection; Conclusion and Open Questions; References; Random Oracles in a Quantum World; Introduction; Our Contributions; Preliminaries; Quantum Computation; Quantum-Accessible Random Oracles
Hard Problems for Quantum ComputersCryptographic Primitives; Separation Result; Construction; Signature Schemes in the Quantum-Accessible Random Oracle Model; Secure Signatures from Preimage Sampleable Trapdoor Functions (PSF); Secure Signatures from Claw-Free Permutations; Encryption Schemes in the Quantum-Accessible Random Oracle Model; CPA Security of BR Encryption; CCA Security of Hybrid Encryption; Conclusion; References; Public Key Encryption I; Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security; Introduction; Background
Selective Opening Secure EncryptionLossy Encryption; Constructing Lossy Encryption Schemes; Re-Randomizable Encryption Implies Lossy Encryption; Statistically-Hiding {Catalog}>]>>>>()21-OT Implies Lossy Encryption; Chosen-Ciphertext Security; Chosen-Ciphertext Security: Indistinguishability; Chameleon Hash Functions; A Special Use of the Canetti-Halevi-Katz Paradigm; Lossy and All-But-n Trapdoor Functions; An IND-SO-stag-wCCA2 TBE Construction; An All-But-n Function with Short Outputs; References
Structure Preserving CCA Secure Encryption and ApplicationsIntroduction; Structure Preserving Encryption; Basic Notation; Construction; Correctness and Security; Secure Joint Ciphertext Computation; Preliminaries; Construction; Oblivious Third Parties; Conclusion; References; Decoding Random Linear Codes in (20.054n); Introduction; Notation; Information Set Decoding Algorithms; Information Set Decoding; Stern's Algorithm; The Finiasz-Sendrier ISD Algorithm; Ball-collision Decoding; How to Solve the Submatrix Problem; The ColumnMatch Algorithm; Our New Decoding Algorithm; Experiments
Summary This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011. The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature; and leakage resilient cryptography
Analysis Computer science
Data protection
Data encryption (Computer science)
Computer software
Computational complexity
Information Systems
Management of Computing and Information Systems
Systems and Data Security
Notes International conference proceedings
Bibliography Includes bibliographical references and author index
Subject Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Data protection -- Congresses
Informatique.
Computer security
Data encryption (Computer science)
Data protection
Genre/Form Conference papers and proceedings
Form Electronic book
Author Lee, Dong Hoon.
Wang, Xiaoyun, 1966-
ISBN 9783642253850
3642253857
Other Titles ASIACRYPT 2011