Advances in Cryptology – ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 – December 3, 2015, Proceedings, Part I

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015.

The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices.

Author(s): Tetsu Iwata, Jung Hee Cheon (eds.)
Series: Lecture Notes in Computer Science 9452
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2015

Language: English
Pages: XXV, 810
Tags: Data Encryption; Systems and Data Security; Coding and Information Theory; Management of Computing and Information Systems; Theory of Computation; Mathematics of Computing

Front Matter....Pages -
Front Matter....Pages 1-1
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance....Pages 3-24
Front Matter....Pages 25-25
Multi-input Functional Encryption for Unbounded Arity Functions....Pages 27-51
Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation....Pages 52-75
Front Matter....Pages 77-77
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model....Pages 79-102
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security....Pages 103-120
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators....Pages 121-145
Front Matter....Pages 147-147
Multiple Discrete Logarithm Problems with Auxiliary Inputs....Pages 149-173
Solving Linear Equations Modulo Unknown Divisors: Revisited....Pages 174-188
Fourℚ: Four-Dimensional Decompositions on a ℚ-curve over the Mersenne Prime....Pages 189-213
Front Matter....Pages 214-235
Efficient Fully Structure-Preserving Signatures for Large Messages....Pages 237-237
A Provably Secure Group Signature Scheme from Code-Based Assumptions....Pages 239-259
Type 2 Structure-Preserving Signature Schemes Revisited....Pages 260-285
Design Principles for HFEv- Based Multivariate Signature Schemes....Pages 286-310
Front Matter....Pages 311-334
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness....Pages 335-335
Three-Party ORAM for Secure Computation....Pages 337-359
On Cut-and-Choose Oblivious Transfer and Its Variants....Pages 360-385
Front Matter....Pages 386-412
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption....Pages 413-413
Selective Opening Security for Receivers....Pages 415-442
Function-Hiding Inner Product Encryption....Pages 443-469
Front Matter....Pages 470-491
Idealizing Identity-Based Encryption....Pages 493-493
A Framework for Identity-Based Encryption with Almost Tight Security....Pages 495-520
Riding on Asymmetry: Efficient ABE for Branching Programs....Pages 521-549
Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs....Pages 550-574
Front Matter....Pages 575-601
QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions....Pages 603-603
Dual-System Simulation-Soundness with Applications to UC-PAKE and More....Pages 605-629
Secret Sharing and Statistical Zero Knowledge....Pages 630-655
Compactly Hiding Linear Spans....Pages 656-680
Front Matter....Pages 681-707
A Unified Approach to MPC with Preprocessing Using OT....Pages 709-709
Secure Computation from Millionaire....Pages 711-735
Garbling Scheme for Formulas with Constant Size of Garbled Gates....Pages 736-757
Card-Based Cryptographic Protocols Using a Minimal Number of Cards....Pages 758-782
Back Matter....Pages 783-807
....Pages -