Buch, Englisch, Band 12710, 756 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1153 g
24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part I
Buch, Englisch, Band 12710, 756 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1153 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-030-75244-6
Verlag: Springer International Publishing
The 52 papers included in these proceedings were carefully reviewed and selected from 156 submissions. They focus on all aspects of public-key cryptography, covering theory, implementations and applications. This year, post-quantum cryptography, PQC constructions and cryptanalysis received special attention.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Post-Quantum Constructions and Cryptanalysis.- QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model.- An Alternative Approach for SIDH Arithmetic.- The Convergence of Slide-type Reductions.- On the Success Probability of Solving Unique SVP via BKZ.- Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattice.- Isogeny-based key compression without pairings.- Analysis of Multivariate Encryption Schemes: Application to Dob.- On the Integer Polynomial Learning with Errors Problem.- Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments.- Multivariate Public Key Cryptosystem from Sidon Spaces.- Banquet: Short and Fast Signatures from AES.- Cryptographic Primitives and Schemes.- Improving Revocation for Group Signature with Redactable Signature.- Bootstrapping fully homomorphic encryption over the integers in less than one second.- Group Signatures with User-Controlled and Sequential Linkability.- Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties.- Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks.- Two-Party Adaptor Signatures From Identification Schemes.- Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup.- Universal Proxy Re-Encryption.- Master-Key KDM-Secure ABE via Predicate Encoding.- Exact Lattice Sampling from Non-Gaussian Distributions.- Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance.- Subversion-Resilient Public Key Encryption with Practical Watchdogs.- Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings.- Updatable Signatures and Message Authentication Codes.- Multi-Client Functional Encryption for Separable Functions.