Buch, Englisch, 774 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1177 g
Reihe: Security and Cryptology
27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part IV
Buch, Englisch, 774 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1177 g
Reihe: Security and Cryptology
ISBN: 978-3-030-92067-8
Verlag: Springer International Publishing
The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows:
Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security;
Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols;
Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search;
Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
NTRU Fatigue: How Stretched is Overstretched?.- Faster Dual Lattice Attacks for Solving LWE -- with applications to CRYSTALS.- Lattice sieving via quantum random walks.- A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.- Gladius: LWR based efficient hybrid public key encryption with distributed decryption.- Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy.- A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV.- Shorter Lattice-Based Group Signatures via ``Almost Free'' Encryption and Other Optimizations.- Séta: Supersingular Encryption from Torsion Attacks.- SHealS and HealS: isogeny-based PKEs from a key validation method for SIDH.- Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups.- Public Key Encryption with Flexible Pattern Matching.- Bounded Collusion ABE for TMs from IBE.- Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting.- (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin.- Boosting the Security of Blind Signature Schemes.- PrORAM: Fast O(log n) Authenticated Shares ZK ORAM.- Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures.- Promise $\Sigma$-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups.- The One-More Discrete Logarithm Assumption in the Generic Group Model.- Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge.- Chain Reductions for Multi-Signatures and the HBMS Scheme.- Symmetric Key Exchange with Full Forward Security and Robust Synchronization.- Security Analysis of CPace.- Modular Design of Role-Symmetric Authenticated Key Exchange Protocols.