The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014.
The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.
Author(s): Juan A. Garay, Rosario Gennaro (eds.)
Series: Lecture Notes in Computer Science 8616 Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2014
Language: English
Pages: 574
Tags: Data Encryption; Systems and Data Security; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science
Front Matter....Pages -
Security of Symmetric Encryption against Mass Surveillance....Pages 1-19
The Security of Multiple Encryption in the Ideal Cipher Model....Pages 20-38
Minimizing the Two-Round Even-Mansour Cipher....Pages 39-56
Block Ciphers – Focus on the Linear Layer (feat. PRIDE )....Pages 57-76
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier....Pages 77-94
Automated Analysis of Cryptographic Assumptions in Generic Group Models....Pages 95-112
The Exact PRF-Security of NMAC and HMAC....Pages 113-130
Updates on Generic Attacks against HMAC and NMAC ....Pages 131-148
Improved Generic Attacks against Hash-Based MACs and HAIFA....Pages 149-168
Cryptography from Compression Functions: The UCE Bridge to the ROM....Pages 169-187
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources....Pages 188-205
Low Overhead Broadcast Encryption from Multilinear Maps....Pages 206-223
Security Analysis of Multilinear Maps over the Integers....Pages 224-240
Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups....Pages 241-260
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations....Pages 261-279
Revisiting the Gentry-Szydlo Algorithm....Pages 280-296
Faster Bootstrapping with Polynomial Error....Pages 297-314
Hardness of k -LWE and Applications in Traitor Tracing....Pages 315-334
Improved Short Lattice Signatures in the Standard Model....Pages 335-352
New and Improved Key-Homomorphic Pseudorandom Functions....Pages 353-370
Homomorphic Signatures with Efficient Verification for Polynomial Functions....Pages 371-389
Structure-Preserving Signatures from Type II Pairings....Pages 390-407
(Hierarchical) Identity-Based Encryption from Affine Message Authentication....Pages 408-425
Witness Encryption from Instance Independent Assumptions....Pages 426-443
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis....Pages 444-461
On the Impossibility of Cryptography with Tamperable Randomness....Pages 462-479
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation....Pages 480-499
Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings....Pages 500-517
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input....Pages 518-535
Maliciously Circuit-Private FHE....Pages 536-553
Algorithms in HElib....Pages 554-571
Back Matter....Pages -