Limit search to available items
Book Cover
E-book
Author CRYPTO (Conference) (37th : 2017 : Santa Barbara, Calif.)

Title Advances in cryptology -- CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings. Part II / Jonathan Katz, Hovav Shacham (eds.)
Published Cham : Springer, 2017

Copies

Description 1 online resource (xv, 735 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 10402
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 10402. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro; Preface; Crypto 2017 The 37th IACR International Cryptology Conference; Contents -- Part II; OT and ORAM; Secure Computation Based on Leaky Correlations: High Resilience Setting; 1 Introduction; 1.1 Model; 1.2 Our Contribution; 1.3 Prior Relevant Works; 1.4 Technical Overview; 2 Preliminaries; 2.1 Functionalities and Correlations; 2.2 Toeplitz Matrix Distribution; 2.3 Graph Representation of Correlations; 3 Extracting One OLE over a Large Field; 3.1 Extraction of One Secure [K] Correlation; 3.2 Securely Realizing [K] Using [K] Correlation
4 Embedding Multiple s into an over an Extension Field4.1 Intuition of the Embedding; 4.2 Relevant Prior Work on 3-Free Sets; 4.3 Generating Explicit Embedding and Proof of Theorem 1; 5 Simple Partition Number; 5.1 Intuition of the Hardness of Computation Result; 5.2 Relevant Prior Work on Graph Covering Problems; 5.3 Relation to Leakage Resilience: Proof of Lemma 4; 5.4 Estimates of Simple Partition Number and Proof of Theorem 2; 5.5 Subsuming the Partition Argument; 5.6 Relevant Prior Work on Common Information and Assisted Common Information
5.7 Analogy of Biclique Partition Number and Wyner's Common InformationReferences; Laconic Oblivious Transfer and Its Applications; 1 Introduction; 1.1 Laconic OT; 1.2 Warm-Up Application: Non-interactive Secure Computation on Large Inputs; 1.3 Main Application: Multi-hop Homomorphic Encryption for RAM Programs; 1.4 Roadmap; 2 Technical Overview; 2.1 Laconic OT; 2.2 Non-interactive Secure Computation on Large Inputs; 2.3 Multi-hop Homomorphic Encryption for RAM Programs; 3 Laconic Oblivious Transfer; 3.1 Laconic OT; 3.2 Updatable Laconic OT
4 Laconic Oblivious Transfer with Factor-2 Compression4.1 Somewhere Statistically Binding Hash Functions and Hash Proof Systems; 4.2 HPS-friendly SSB Hashing; 4.3 A Hash Proof System for Knowledge of Preimage Bits; 4.4 The Laconic OT Scheme; 5 Construction of Updatable Laconic OT; 5.1 Background; 5.2 Construction Overview; References; Black-Box Parallel Garbled RAM; 1 Introduction; 1.1 Problem Statement; 1.2 Comparison with Previous Work; 1.3 Our Results; 1.4 Overview of New Ideas for Our Construction; 1.5 Roadmap; 2 Preliminaries; 2.1 Notation; 2.2 PRAM: Parallel RAM Programs
2.3 Garbled Circuits2.4 Oblivious PRAM; 2.5 Garbled Parallel RAM; 3 Construction of Black-Box Parallel GRAM; 3.1 Overview; 3.2 Data Garbling: (, s) GData(1, D); 3.3 Program Garbling: (, sin) GProg(1, 1logN, 1t, s, told); 3.4 Input Garbling: GInput(1, x, sin); 3.5 Garbled Evaluation: y GEval(,); 4 Cost and Correctness Analysis; 4.1 Overall Cost; 4.2 Correctness; 5 Main Theorem; References; A UMA2-security Proof; B UMA2 to Full Security; Foundations II; Non-Malleable Codes for Space-Bounded Tampering; 1 Introduction; 1.1 Our Contribution; 1.2 Additional Related Work; 2 Preliminaries
Summary The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto
Notes International conference proceedings
Includes author index
Online resource; title from PDF title page (SpringerLink, viewed August 17, 2017)
Subject Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer security.
Network hardware.
Software Engineering.
Information architecture.
Coding theory & cryptology.
Computers -- Security -- General.
Computers -- Hardware -- Network Hardware.
Computers -- Software Development & Engineering -- General.
Business & Economics -- Information Management.
Computers -- Information Theory.
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Katz, Jonathan, 1974- editor.
Shacham, Hovav, editor.
ISBN 9783319637150
3319637150
3319637142
9783319637143
Other Titles CRYPTO 2017