Limit search to available items
Book Cover
E-book
Author International Conference on the Theory and Application of Cryptology and Information Security (25th : 2019 : Kobe, Japan)

Title Advances in Cryptology -- ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings. Part I / Steven D. Galbraith, Shiho Moriai (eds.)
Published Cham : Springer, 2019

Copies

Description 1 online resource (711 pages)
Series Lecture Notes in Computer Science Ser. ; v. 11921
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 11921.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro; Preface; ASIACRYPT 2019 The 25th Annual International Conference on Theory and Application of Cryptology and Information Security; Contents -- Part I; Invited Talk; Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey); 1 Introduction; 1.1 Problem Statement; 1.2 Classical Blockchain Protocols: A Bi-modal Approach; 1.3 Streamlined Blockchains: A New Paradigm; 2 A Blockchain Tolerating <1/3 Corruptions; 2.1 Valid Blockchain and Freshness; 2.2 Protocol; 2.3 Consistency Proof; 2.4 Liveness Proof; 3 A Synchronous Blockchain Tolerating Minority Corruptions
3.1 Protocol3.2 Consistency Proof; 3.3 Liveness Proof; 4 Additional Improvements and References; A Notations; References; Best Paper; Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes; 1 Introduction; 2 Notation; 3 The Wave-family of Trapdoor One-Way Preimage Sampleable Functions; 3.1 One-Way Preimage Sampleable Code-Based Functions; 3.2 The Wave Family of PSA Functions; 4 Inverting the Syndrome Function; 4.1 Surjective Domain of the Syndrome Function; 4.2 Easy Domain of the Syndrome Function; 4.3 Solution with Trapdoor
5 Preimage Sampling with Trapdoor: Achieving a Uniformly Distributed Output5.1 Rejection Sampling to Reach Uniformly Distributed Output; 5.2 Application to the Prange Decoder; 6 Achieving Uniform Domain Sampling; 7 Concluding Remarks and Further Work; References; Lattices (1); Middle-Product Learning with Rounding Problem and Its Applications; 1 Introduction; 2 Preliminaries; 2.1 Rounding; 2.2 Reconciliation; 2.3 Probabilities; 2.4 Middle-Product Learning With Errors; 3 Random Hankel Matrices; 4 Middle-Product Learning with Rounding; 4.1 Definition of the MP-CLWR Assumption
4.2 Hardness of MP-CLWR5 A Public Key Encryption Scheme Based on MP-CLWR; 5.1 Definition and Correctness; 5.2 Provable Security; 6 Parameters and Comparison; References; A Novel CCA Attack Using Decryption Errors Against LAC; 1 Introduction; 1.1 Related Works; 1.2 Contributions; 1.3 Organization; 2 Description of LAC; 2.1 Some Basic Notation; 2.2 The LAC Scheme; 3 The Attack; 3.1 Attack Step 1 -- Precomputation; 3.2 Attack Step 2 -- Submit Ciphertexts for Decryption; 3.3 Attack Step 3 -- Statistical Analysis; 4 Statistical Analysis
4.1 Theoretical Arguments for Statistical Recovery of the Contribution Vector4.2 A Heuristic Approach; 4.3 The Complexity Analysis; 4.4 Discussions; 5 Attacking the LAC Version in Round 2 of the NIST PQ-Project; 5.1 Attack Step 1 -- Precomputation; 5.2 Attack Step 2 -- Submit Ciphertexts for Decryption; 5.3 Attack Step 3 -- Recovering S; 6 Discussions; 7 Conclusions and Future Works; References; Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More; 1 Introduction; 1.1 Our Results and Contributions; 1.2 Technical Overview; 1.3 Related Work; 2 Preliminaries
Summary The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019. The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge
Notes 2.1 Random Access Machines
International conference proceedings
Includes author index
Print version record
Subject Data encryption (Computer science) -- Congresses
Data encryption (Computer science)
Genre/Form Electronic books
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Galbraith, Steven D.
Moriai, Shiho.
ISBN 9783030345785
3030345785