Advances in Cryptology – EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.

Author(s): Phong Q. Nguyen, Elisabeth Oswald (eds.)
Series: Lecture Notes in Computer Science 8441 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2014

Language: English
Pages: 714
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Systems and Data Security

Front Matter....Pages -
A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic....Pages 1-16
Polynomial Time Attack on Wild McEliece over Quadratic Extensions....Pages 17-39
Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus....Pages 40-57
Why Proving HIBE Systems Secure Is Difficult....Pages 58-76
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack....Pages 77-92
Key Derivation without Entropy Waste....Pages 93-110
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits....Pages 111-128
Revocable Quantum Timed-Release Encryption....Pages 129-146
Generic Universal Forgery Attack on Iterative Hash-Based MACs....Pages 147-164
Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities....Pages 165-182
Faster Compact Diffie–Hellman: Endomorphisms on the x -line....Pages 183-200
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation....Pages 201-220
Protecting Obfuscation against Algebraic Attacks....Pages 221-238
GGHLite: More Efficient Multilinear Maps from Ideal Lattices....Pages 239-256
Reconsidering Generic Composition....Pages 257-274
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions....Pages 275-292
Honey Encryption: Security Beyond the Brute-Force Bound....Pages 293-310
Sometimes-Recurse Shuffle....Pages 311-326
Tight Security Bounds for Key-Alternating Ciphers....Pages 327-350
The Locality of Searchable Symmetric Encryption....Pages 351-368
A Bound for Multiparty Secret Key Agreement and Implications for a Problem of Secure Computing....Pages 369-386
Non-Interactive Secure Computation Based on Cut-and-Choose....Pages 387-404
Garbled RAM Revisited....Pages 405-422
Unifying Leakage Models: From Probing Attacks to Noisy Leakage.....Pages 423-440
Higher Order Masking of Look-Up Tables....Pages 441-458
How to Certify the Leakage of a Chip?....Pages 459-476
Efficient Round Optimal Blind Signatures....Pages 477-495
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig....Pages 496-513
Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures....Pages 514-532
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits....Pages 533-556
Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More....Pages 557-577
Multi-input Functional Encryption....Pages 578-602
Salvaging Indifferentiability in a Multi-stage Setting....Pages 603-621
Déjà Q: Using Dual Systems to Revisit q -Type Assumptions....Pages 622-639
Distributed Point Functions and Their Applications....Pages 640-658
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation....Pages 659-676
On the Complexity of UC Commitments....Pages 677-694
Universally Composable Symbolic Analysis for Two-Party Protocols Based on Homomorphic Encryption....Pages 695-712
Back Matter....Pages -