The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.
Author(s): Palash Sarkar, Tetsu Iwata (eds.)
Series: Lecture Notes in Computer Science 8874 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2014
Language: English
Pages: 528
Tags: Data Encryption; Systems and Data Security; Coding and Information Theory; Management of Computing and Information Systems; Theory of Computation; Mathematics of Computing
Front Matter....Pages -
Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security....Pages 1-21
Efficient Identity-Based Encryption over NTRU Lattices....Pages 22-41
Order-Preserving Encryption Secure Beyond One-Wayness....Pages 42-61
Statistically-secure ORAM with $\tilde{O}(\log^2 n)$ Overhead....Pages 62-81
Adaptive Security of Constrained PRFs....Pages 82-101
Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation....Pages 102-121
Using Indistinguishability Obfuscation via UCEs....Pages 122-141
Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input....Pages 142-161
Bootstrapping Obfuscators via Fast Pseudorandom Functions....Pages 162-172
Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack....Pages 173-192
Authenticating Computation on Groups: New Homomorphic Primitives and Applications....Pages 193-212
Compact VSS and Efficient Homomorphic UC Commitments....Pages 213-232
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model....Pages 233-253
Secret-Sharing for NP ....Pages 254-273
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework....Pages 274-288
Memory-Demanding Password Scrambling....Pages 289-305
Side-Channel Analysis of Multiplications in GF(2 128 )....Pages 306-325
Higher-Order Threshold Implementations....Pages 326-343
Masks Will Fall Off ....Pages 344-365
Black-Box Separations for One-More (Static) CDH and Its Generalization....Pages 366-385
Black-Box Separations for Differentially Private Protocols....Pages 386-405
Composable Security of Delegated Quantum Computation....Pages 406-425
All-But-Many Encryption....Pages 426-447
Multi-valued Byzantine Broadcast: The t < n Case....Pages 448-465
Fairness versus Guaranteed Output Delivery in Secure Multiparty Computation....Pages 466-485
Actively Secure Private Function Evaluation....Pages 486-505
Efficient, Oblivious Data Structures for MPC....Pages 506-525
Back Matter....Pages -