Download Advances in Cryptology - ASIACRYPT 2013: 19th International by Charanjit S. Jutla, Arnab Roy (auth.), Kazue Sako, Palash PDF

By Charanjit S. Jutla, Arnab Roy (auth.), Kazue Sako, Palash Sarkar (eds.)

The two-volume set LNCS 8269 and 8270 constitutes the refereed court cases of the nineteenth foreign convention at the concept and alertness of Cryptology and data, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The fifty four revised complete papers provided have been rigorously chosen from 269 submissions. they're geared up in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and research, side-channel cryptanalysis, message authentication codes, signatures, cryptography dependent upon actual assumptions, multi-party computation, cryptographic primitives, research, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Show description

Read or Download Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I PDF

Similar international_1 books

Distributed, Parallel and Biologically Inspired Systems: 7th IFIP TC 10 Working Conference, DIPES 2010 and 3rd IFIP TC 10 International Conference, BICC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings

St This quantity includes the court cases of 2 meetings held as a part of the 21 IFIP international computing device Congress in Brisbane, Australia, 20–23 September 2010. th the 1st a part of the booklet provides the lawsuits of DIPES 2010, the 7 IFIP convention on allotted and Parallel Embedded platforms. The convention, int- duced in a separate preface via the Chairs, covers quite a number subject matters from specification and layout of embedded structures via to dependability and fault tolerance.

Neural Information Processing: 23rd International Conference, ICONIP 2016, Kyoto, Japan, October 16–21, 2016, Proceedings, Part I

The 4 quantity set LNCS 9947, LNCS 9948, LNCS 9949, and LNCS 9950 constitutes the court cases of the twenty third foreign convention on Neural info Processing, ICONIP 2016, held in Kyoto, Japan, in October 2016. The 296 complete papers offered have been conscientiously reviewed and chosen from 431 submissions.

Extra resources for Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I

Sample text

4 4 Indeed, Micali and Reyzin [23] gave concrete counter-examples to show that standalone soundness does not imply concurrent soundness in the bare public key model. It is not difficult to see that their results immediately extend to the bounded player model. 32 V. Goyal et al. Parameters: Security parameter n, number of players N = N (n), length parameter (N ).

E. without access to the secret key, then we call the scheme publicly-verifiable. While there is a well known reduction from hierarchical IBE to make an IBE scheme CCA2secure [4], that reduction does not make the scheme publicly-verifiable CCA2 in a useful manner. In the IBE setting, publicly-verifiable also requires that it be verifiable if the ciphertext is valid for the claimed identity. This can have interesting applications where the network can act as a filter. We show that our scheme above can be extended to be publicly-verifiable CCA2-fully-secure IBE with only two additional group elements in the ciphertext (and two additional group elements in the keys).

Springer, Heidelberg (2013) 7. : Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. R. ) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45–64. Springer, Heidelberg (2002) 8. pdf 9. : An algebraic framework for diffie-hellman assumptions. A. ) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 129–147. Springer, Heidelberg (2013) 10. : How to prove yourself: Practical solutions to identification and signature problems. M. ) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987) 11.

Download PDF sample

Rated 4.27 of 5 – based on 48 votes