Description |
1 online resource (xiv, 760 pages) |
Series |
Lecture notes in computer science, 0302-9743 ; 7073 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7073.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Intro; Title; Preface; Table of Contents; Lattices and Quantum Cryptography; BKZ 2.0: Better Lattice Security Estimates; Introduction; Preliminaries; The Blockwise Korkine-Zolotarev (BKZ) Algorithm; Description; Enumeration Subroutine; Analysis; BKZ 2.0; Sound Pruning; Preprocessing of Local Blocks; Optimizing the Enumeration Radius; New Lattice Records; Darmstadt's Lattice Challenge; SVP Challenges; Predicting BKZ 2.0 by Simulation; Description; Consistency with Experiments; Enumeration Subroutine; Revising Security Estimates; NTRU Lattices |
|
Gentry-Halevi's Fully-Homomorphic Encryption ChallengesReferences; Functional Encryption for Inner Product Predicates from Learning with Errors; Introduction; Overview of the Construction; Predicate Encryption; Security; Lattice Preliminaries; Lattices; Sampling Algorithms; The LWE Problem; A Functional Encryption Scheme for Inner Product Predicates; The Construction; Correctness; Security; Parameter Selection; Conclusion and Open Questions; References; Random Oracles in a Quantum World; Introduction; Our Contributions; Preliminaries; Quantum Computation; Quantum-Accessible Random Oracles |
|
Hard Problems for Quantum ComputersCryptographic Primitives; Separation Result; Construction; Signature Schemes in the Quantum-Accessible Random Oracle Model; Secure Signatures from Preimage Sampleable Trapdoor Functions (PSF); Secure Signatures from Claw-Free Permutations; Encryption Schemes in the Quantum-Accessible Random Oracle Model; CPA Security of BR Encryption; CCA Security of Hybrid Encryption; Conclusion; References; Public Key Encryption I; Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security; Introduction; Background |
|
Selective Opening Secure EncryptionLossy Encryption; Constructing Lossy Encryption Schemes; Re-Randomizable Encryption Implies Lossy Encryption; Statistically-Hiding {Catalog}>]>>>>()21-OT Implies Lossy Encryption; Chosen-Ciphertext Security; Chosen-Ciphertext Security: Indistinguishability; Chameleon Hash Functions; A Special Use of the Canetti-Halevi-Katz Paradigm; Lossy and All-But-n Trapdoor Functions; An IND-SO-stag-wCCA2 TBE Construction; An All-But-n Function with Short Outputs; References |
|
Structure Preserving CCA Secure Encryption and ApplicationsIntroduction; Structure Preserving Encryption; Basic Notation; Construction; Correctness and Security; Secure Joint Ciphertext Computation; Preliminaries; Construction; Oblivious Third Parties; Conclusion; References; Decoding Random Linear Codes in (20.054n); Introduction; Notation; Information Set Decoding Algorithms; Information Set Decoding; Stern's Algorithm; The Finiasz-Sendrier ISD Algorithm; Ball-collision Decoding; How to Solve the Submatrix Problem; The ColumnMatch Algorithm; Our New Decoding Algorithm; Experiments |
Summary |
This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011. The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature; and leakage resilient cryptography |
Analysis |
Computer science |
|
Data protection |
|
Data encryption (Computer science) |
|
Computer software |
|
Computational complexity |
|
Information Systems |
|
Management of Computing and Information Systems |
|
Systems and Data Security |
Notes |
International conference proceedings |
Bibliography |
Includes bibliographical references and author index |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer security -- Congresses
|
|
Data protection -- Congresses
|
|
Informatique.
|
|
Computer security
|
|
Data encryption (Computer science)
|
|
Data protection
|
Genre/Form |
Conference papers and proceedings
|
Form |
Electronic book
|
Author |
Lee, Dong Hoon.
|
|
Wang, Xiaoyun, 1966-
|
ISBN |
9783642253850 |
|
3642253857 |
|