Description |
1 online resource (711 pages) |
Series |
Lecture Notes in Computer Science Ser. ; v. 11921 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 11921.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Intro; Preface; ASIACRYPT 2019 The 25th Annual International Conference on Theory and Application of Cryptology and Information Security; Contents -- Part I; Invited Talk; Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey); 1 Introduction; 1.1 Problem Statement; 1.2 Classical Blockchain Protocols: A Bi-modal Approach; 1.3 Streamlined Blockchains: A New Paradigm; 2 A Blockchain Tolerating <1/3 Corruptions; 2.1 Valid Blockchain and Freshness; 2.2 Protocol; 2.3 Consistency Proof; 2.4 Liveness Proof; 3 A Synchronous Blockchain Tolerating Minority Corruptions |
|
3.1 Protocol3.2 Consistency Proof; 3.3 Liveness Proof; 4 Additional Improvements and References; A Notations; References; Best Paper; Wave: A New Family of Trapdoor One-Way Preimage Sampleable Functions Based on Codes; 1 Introduction; 2 Notation; 3 The Wave-family of Trapdoor One-Way Preimage Sampleable Functions; 3.1 One-Way Preimage Sampleable Code-Based Functions; 3.2 The Wave Family of PSA Functions; 4 Inverting the Syndrome Function; 4.1 Surjective Domain of the Syndrome Function; 4.2 Easy Domain of the Syndrome Function; 4.3 Solution with Trapdoor |
|
5 Preimage Sampling with Trapdoor: Achieving a Uniformly Distributed Output5.1 Rejection Sampling to Reach Uniformly Distributed Output; 5.2 Application to the Prange Decoder; 6 Achieving Uniform Domain Sampling; 7 Concluding Remarks and Further Work; References; Lattices (1); Middle-Product Learning with Rounding Problem and Its Applications; 1 Introduction; 2 Preliminaries; 2.1 Rounding; 2.2 Reconciliation; 2.3 Probabilities; 2.4 Middle-Product Learning With Errors; 3 Random Hankel Matrices; 4 Middle-Product Learning with Rounding; 4.1 Definition of the MP-CLWR Assumption |
|
4.2 Hardness of MP-CLWR5 A Public Key Encryption Scheme Based on MP-CLWR; 5.1 Definition and Correctness; 5.2 Provable Security; 6 Parameters and Comparison; References; A Novel CCA Attack Using Decryption Errors Against LAC; 1 Introduction; 1.1 Related Works; 1.2 Contributions; 1.3 Organization; 2 Description of LAC; 2.1 Some Basic Notation; 2.2 The LAC Scheme; 3 The Attack; 3.1 Attack Step 1 -- Precomputation; 3.2 Attack Step 2 -- Submit Ciphertexts for Decryption; 3.3 Attack Step 3 -- Statistical Analysis; 4 Statistical Analysis |
|
4.1 Theoretical Arguments for Statistical Recovery of the Contribution Vector4.2 A Heuristic Approach; 4.3 The Complexity Analysis; 4.4 Discussions; 5 Attacking the LAC Version in Round 2 of the NIST PQ-Project; 5.1 Attack Step 1 -- Precomputation; 5.2 Attack Step 2 -- Submit Ciphertexts for Decryption; 5.3 Attack Step 3 -- Recovering S; 6 Discussions; 7 Conclusions and Future Works; References; Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More; 1 Introduction; 1.1 Our Results and Contributions; 1.2 Technical Overview; 1.3 Related Work; 2 Preliminaries |
Summary |
The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019. The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge |
Notes |
2.1 Random Access Machines |
|
International conference proceedings |
|
Includes author index |
|
Print version record |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Data encryption (Computer science)
|
Genre/Form |
Electronic books
|
|
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Galbraith, Steven D.
|
|
Moriai, Shiho.
|
ISBN |
9783030345785 |
|
3030345785 |
|