|
![]() |
|||
|
||||
OverviewThe three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing. Full Product DetailsAuthor: Shiho Moriai , Huaxiong WangPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG Edition: 1st ed. 2020 Volume: 12492 Weight: 1.258kg ISBN: 9783030648336ISBN 10: 3030648338 Pages: 818 Publication Date: 05 December 2020 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsPublic Key Cryptography.- Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage.- Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions.- Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions.- Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.- Unbounded HIBE with Tight Security.- Multi-Client Oblivious RAM with Poly-Logarithmic Communication.- Privacy-Preserving Pattern Matching on Encrypted Data.- Efficient Homomorphic Comparison Methods with Optimal Complexity.- Lattice-Based Cryptography.- Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings.- Towards Classical Hardness of Module-LWE: The Linear Rank Case.- Lattice-Based E-Cash, Revisited.- Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices.- Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers.- Isogeny-Based Cryptography.- Cryptographic Group Actions and Applications.- B-SIDH: supersingular isogeny Di e-Hellman using twisted torsion.- Calamari and Fala : Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices.- Radical Isogenies.- Oblivious Pseudorandom Functions from Isogenies.- SiGamal: A supersingular isogeny-based PKE and its application to a PRF.- Quantum Algorithms.- Estimating quantum speedups for lattice sieves.- A Combinatorial Approach to Quantum Random Functions.- Improved Classical and Quantum Algorithms for Subset-Sum.- Security Limitations of Classical-Client Delegated Quantum Computing.- Quantum Circuit Implementations of AES with Fewer Qubits.- Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories.- Authenticated Key Exchange.- Fuzzy Asymmetric Password-Authenticated Key Exchange.- Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |