Description |
1 online resource (xv, 713 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 10403 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 10403. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Intro; Preface; Crypto 2017 The 37th IACR International Cryptology Conference; Contents -- Part III; Authenticated Encryption; Boosting Authenticated Encryption Robustness with Minimal Modifications; 1 Introduction; 1.1 Robust Algorithms; 1.2 Release of Unverified Plaintext; 1.3 Contributions; 2 Related Work; 3 Preliminaries; 3.1 Notation; 3.2 Adversaries and Advantages; 3.3 Authenticated Encryption Schemes; 4 Resilience to Nonce Misuse; 4.1 OCB Attacks; 4.2 Chosen-Plaintext Confidentiality; 4.3 Authenticity; 4.4 Chosen-Ciphertext Confidentiality; 5 Adding RUP Security to Encryption Schemes |
|
5.1 Definitions5.2 Generic Construction; 5.3 GCM-RUP; A Algorithm Descriptions; A.1 OCB; A.2 GCM; A.3 ChaCha20+Poly1305; B Formal Security Argument For The Generic Construction; C Application to Tor; C.1 Tor; C.2 The Crypto-tagging Attack; C.3 Avoiding the Attack; References; ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication; 1 Introduction; 2 Preliminaries; 3 Specification of ZMAC; 3.1 Overview; 3.2 Specification of ZHASH for the Case t N; 3.3 Specification of ZHASH for the Case t> n; 3.4 Finalization; 4 The PRF Security of ZMAC; 4.1 XT Tweak Extension |
|
4.2 Collision Probability of ZHASH4.3 PRF Security of Finalization; 4.4 PRF Security of ZMAC; 4.5 Other Variants of ZMAC; 5 Application to Authenticated Encryption: ZAE; 6 MAC and AE Instances; 6.1 Handling the Domain Separation of TBC Instances; 6.2 Efficiency Comparisons; References; Message Franking via Committing Authenticated Encryption; 1 Introduction; 2 Preliminaries; 3 Message Franking and End-to-End Encryption; 4 Committing AEAD; 5 Are Existing AEAD Schemes Committing?; 5.1 Committing Encode-then-Encipher; 5.2 Encrypt-then-MAC; 5.3 MAC-then-Encrypt; 5.4 Some Non-binding AEAD Schemes |
|
6 Composing Commitment and AEAD7 Nonce-Based Committing AEAD and the CEP Construction; 8 Analysis of CEP; 9 Related Work; References; Key Rotation for Authenticated Encryption; 1 Introduction; 2 Updatable AE; 3 Confidentiality and Integrity for Updatable Encryption; 3.1 Message Confidentiality; 3.2 Ciphertext Integrity; 4 Practical Updatable AE Schemes; 4.1 Authenticated Encryption; 4.2 (In- )Security of AE-Hybrid Construction; 4.3 Improving AE-Hybrid; 5 Indistinguishability of Re-encryptions; 6 Revisiting the BLMR Scheme; 6.1 Negative Result About Provable UP-IND Security of BLMR |
|
7 An Updatable AE Scheme with Re-encryption Indistinguishability7.1 Security of ReCrypt; 7.2 Instantiating the Key-Homomorphic PRF; 7.3 Implementation and Performance; 8 Conclusion and Open Problems; A Bidirectional Updatable AE; A.1 XOR-KEM: A Bidirectional Updatable AE Scheme; References; Public-Key Encryption; Kurosawa-Desmedt Meets Tight Security; 1 Introduction; 2 Preliminaries; 2.1 Notations; 2.2 Hash Functions; 2.3 Prime-Order Groups; 2.4 Public-Key Encryption; 2.5 Key Encapsulation Mechanism; 3 Qualified Proof Systems; 4 The OR-Proof; 4.1 Public Parameters and the OR-Languages |
Summary |
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto |
Notes |
International conference proceedings |
|
Includes author index |
|
Online resource; title from PDF title page (SpringerLink, viewed August 17, 2017) |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer security -- Congresses
|
|
Network hardware.
|
|
Computer security.
|
|
Coding theory & cryptology.
|
|
Ethical & social aspects of IT.
|
|
Software Engineering.
|
|
Computers -- Hardware -- Network Hardware.
|
|
Computers -- Security -- General.
|
|
Computers -- Information Theory.
|
|
Computers -- Social Aspects -- General.
|
|
Computers -- Software Development & Engineering -- General.
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Katz, Jonathan, 1974- editor.
|
|
Shacham, Hovav, editor.
|
ISBN |
9783319636979 |
|
3319636979 |
|
3319636960 |
|
9783319636962 |
|