Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015. The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic insights; modes and constructions; multilinear maps and IO; pseudorandomness; block cipher cryptanalysis; integrity; assumptions; hash functions and stream cipher cryptanalysis; implementations; multiparty computation; zero-knowledge; theory; signatures; non-signaling and information-theoretic crypto; attribute-based encryption; new primitives; and fully homomorphic/functional encryption.

Author(s): Rosario Gennaro, Matthew Robshaw (eds.)
Series: Lecture Notes in Computer Science 9216
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2015

Language: English
Pages: XVIII, 783
Tags: Data Encryption; Systems and Data Security; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science

Front Matter....Pages I-XVIII
Front Matter....Pages 1-1
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation....Pages 3-22
Concurrent Secure Computation via Non-Black Box Simulation....Pages 23-42
Concurrent Secure Computation with Optimal Query Complexity....Pages 43-62
Constant-Round MPC with Fairness and Guarantee of Output Delivery....Pages 63-82
Front Matter....Pages 83-83
Statistical Concurrent Non-malleable Zero-Knowledge from One-Way Functions....Pages 85-106
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting....Pages 107-129
Impossibility of Black-Box Simulation Against Leakage Attacks....Pages 130-149
Efficient Zero-Knowledge Proofs of Non-algebraic Statements with Sublinear Amortized Cost....Pages 150-169
Front Matter....Pages 171-171
Parallel Hashing via List Recoverability....Pages 173-190
Cryptography with One-Way Communication....Pages 191-208
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond....Pages 209-229
Front Matter....Pages 231-231
Practical Round-Optimal Blind Signatures in the Standard Model....Pages 233-253
Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys....Pages 254-274
Structure-Preserving Signatures from Standard Assumptions, Revisited....Pages 275-295
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions....Pages 296-316
Front Matter....Pages 317-317
Efficient Constant Round Multi-party Computation Combining BMR and SPDZ....Pages 319-338
Round-Optimal Black-Box Two-Party Computation....Pages 339-358
Secure Computation with Minimal Interaction, Revisited....Pages 359-378
PoW-Based Distributed Cryptography with No Trusted Setup....Pages 379-399
Front Matter....Pages 401-401
Multi-prover Commitments Against Non-signaling Attacks....Pages 403-421
Front Matter....Pages 401-401
Arguments of Proximity....Pages 422-442
Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information....Pages 443-462
Privacy with Imperfect Randomness....Pages 463-482
Front Matter....Pages 483-483
Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption....Pages 485-502
Predicate Encryption for Circuits from LWE....Pages 503-523
Bilinear Entropy Expansion from the Decisional Linear Assumption....Pages 524-541
Front Matter....Pages 543-543
Data Is a Stream: Security of Stream-Based Channels....Pages 545-564
Bloom Filters in Adversarial Environments....Pages 565-584
Proofs of Space....Pages 585-605
Front Matter....Pages 607-607
Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity....Pages 609-629
Multi-identity and Multi-key Leveled FHE from Learning with Errors....Pages 630-656
From Selective to Adaptive Security in Functional Encryption....Pages 657-677
A Punctured Programming Approach to Adaptively Secure Functional Encryption....Pages 678-697
Front Matter....Pages 699-699
Secure Computation from Leaky Correlated Randomness....Pages 701-720
Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits....Pages 721-741
Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs....Pages 742-762
Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting....Pages 763-780
Back Matter....Pages 781-783