Limit search to available items
Record 38 of 585
Previous Record Next Record
Book Cover
E-book
Author CRYPTO (Conference) (37th : 2017 : Santa Barbara, Calif.)

Title Advances in Cryptology - CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings. Part I / edited by Jonathan Katz, Hovav Shacham
Published Cham : Springer, [2017]

Copies

Description 1 online resource (xv, 793 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 10401
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 10401. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro -- Preface -- Crypto 2017 The 37th IACR International Cryptology Conference -- Contents -- Part I -- Functional Encryption -- Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Our Techniques -- 2 Preliminaries -- 2.1 Functional Encryption -- 2.2 Partially Hiding Predicate Encryption -- 2.3 Full Security for Single Key Linear FE -- 2.4 Algorithms Used by Our Constructions -- 2.5 Fully Homomorphic Encryption -- 3 Insecurity of Predicate Encryption Schemes Against General Adversaries
3.1 Attack #1 on Using 1-Keys. -- 4 (1, ̀39̀42̀""613À̀45̀47̀""603Apoly) Very Selective PHPE -- 4.1 Construction -- 4.2 Proof of Security -- 5 Upgrading Very Selective to Semi Adaptive Security for PHPE -- 6 (1,̀39̀42̀""613À̀45̀47̀""603Apoly)-Functional Encryption -- 6.1 Construction -- 6.2 Proof of Security -- References -- Generic Transformations of Predicate Encodings: Constructions and Applications -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Prior Work -- 1.3 Comparison with Agrawal and Chase (EUROCRYPT 2017) -- 2 Background -- 2.1 Notation -- 2.2 Predicate Encodings
2.3 Tag-Based Encodings -- 2.4 Pair Encodings -- 3 Predicate Encodings: Properties and Consequences -- 3.1 Algebraic Properties of Predicate Encodings -- 3.2 Optimizing Predicate Encodings -- 3.3 Combining Predicates -- 4 Tag-Based Encodings -- 5 Pair Encodings -- 5.1 Embedding Predicate Encodings into Pair Encodings -- 5.2 Comparison Between Encoding Transformations -- 6 Constructions -- 6.1 Combining Predicates -- 6.2 Improved Predicate Encodings -- 6.3 Extra Features -- A Proofs from Main Body -- References
Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption -- 1 Introduction -- 1.1 Our Contribution -- 2 Preliminaries -- 2.1 Complexity Assumptions -- 2.2 Functional Encryption -- 2.3 Bilinear Maps Functionality -- 2.4 Predicate Encryption -- 3 Our Functional Encryption for Bilinear Maps from MDDH -- 3.1 Private-Key, Single-Ciphertext Secure FE for Bilinear Maps -- 3.2 Public-Key FE for Bilinear Maps -- 4 Our Efficient Functional Encryption for Bilinear Maps in the GGM -- 5 Predicate Encryption for Bilinear Maps Evaluation
5.1 Applications of PE for Bilinear Maps Evaluation -- References -- Foundations I -- Memory-Tight Reductions -- 1 Introduction -- 1.1 Our Results -- 2 Complexity Measures -- 2.1 Computational Model -- 2.2 Complexity Measures -- 2.3 Case Study I: Unforgeability of Digital Signatures -- 2.4 Case Study II: Collision-Resistance Definitions -- 3 Techniques to Obtain Memory Efficiency -- 3.1 Pseudorandom Functions -- 3.2 Generating (Pseudo)random Coins -- 3.3 Random Oracles -- 3.4 Random Oracle Index Guessing Technique -- 3.5 Single Rewinding Technique -- 4 Streaming Algorithms and Memory-Efficiency
Summary The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto
Bibliography Includes bibliographical references and index
Notes Online resource; title from digital title page (viewed on May 22, 2018)
Subject Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Katz, Jonathan, 1974- editor.
Shacham, Hovav, editor.
ISBN 9783319636887
331963688X
Other Titles CRYPTO 2017