Advances in cryptology -- CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings.: 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings. Part III (2017)
- Record Type:
- Book
- Title:
- Advances in cryptology -- CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings.: 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings. Part III (2017)
- Main Title:
- Advances in cryptology -- CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings.
- Other Titles:
- CRYPTO 2017
- Further Information:
- Note: Jonathan Katz, Hovav Shacham (eds.).
- Editors:
- Katz, Jonathan, 1974-
Shacham, Hovav - Other Names:
- CRYPTO (Conference), 37th
- Contents:
- Intro; Preface; Crypto 2017 The 37th IACR International Cryptology Conference; Contents -- Part III; Authenticated Encryption; Boosting Authenticated Encryption Robustness with Minimal Modifications; 1 Introduction; 1.1 Robust Algorithms; 1.2 Release of Unverified Plaintext; 1.3 Contributions; 2 Related Work; 3 Preliminaries; 3.1 Notation; 3.2 Adversaries and Advantages; 3.3 Authenticated Encryption Schemes; 4 Resilience to Nonce Misuse; 4.1 OCB Attacks; 4.2 Chosen-Plaintext Confidentiality; 4.3 Authenticity; 4.4 Chosen-Ciphertext Confidentiality; 5 Adding RUP Security to Encryption Schemes. 5.1 Definitions5.2 Generic Construction; 5.3 GCM-RUP; A Algorithm Descriptions; A.1 OCB; A.2 GCM; A.3 ChaCha20+Poly1305; B Formal Security Argument For The Generic Construction; C Application to Tor; C.1 Tor; C.2 The Crypto-tagging Attack; C.3 Avoiding the Attack; References; ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication; 1 Introduction; 2 Preliminaries; 3 Specification of ZMAC; 3.1 Overview; 3.2 Specification of ZHASH for the Case t N; 3.3 Specification of ZHASH for the Case t> n; 3.4 Finalization; 4 The PRF Security of ZMAC; 4.1 XT Tweak Extension. 4.2 Collision Probability of ZHASH4.3 PRF Security of Finalization; 4.4 PRF Security of ZMAC; 4.5 Other Variants of ZMAC; 5 Application to Authenticated Encryption: ZAE; 6 MAC and AE Instances; 6.1 Handling the Domain Separation of TBC Instances; 6.2 Efficiency Comparisons; References; Message Franking viaIntro; Preface; Crypto 2017 The 37th IACR International Cryptology Conference; Contents -- Part III; Authenticated Encryption; Boosting Authenticated Encryption Robustness with Minimal Modifications; 1 Introduction; 1.1 Robust Algorithms; 1.2 Release of Unverified Plaintext; 1.3 Contributions; 2 Related Work; 3 Preliminaries; 3.1 Notation; 3.2 Adversaries and Advantages; 3.3 Authenticated Encryption Schemes; 4 Resilience to Nonce Misuse; 4.1 OCB Attacks; 4.2 Chosen-Plaintext Confidentiality; 4.3 Authenticity; 4.4 Chosen-Ciphertext Confidentiality; 5 Adding RUP Security to Encryption Schemes. 5.1 Definitions5.2 Generic Construction; 5.3 GCM-RUP; A Algorithm Descriptions; A.1 OCB; A.2 GCM; A.3 ChaCha20+Poly1305; B Formal Security Argument For The Generic Construction; C Application to Tor; C.1 Tor; C.2 The Crypto-tagging Attack; C.3 Avoiding the Attack; References; ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication; 1 Introduction; 2 Preliminaries; 3 Specification of ZMAC; 3.1 Overview; 3.2 Specification of ZHASH for the Case t N; 3.3 Specification of ZHASH for the Case t> n; 3.4 Finalization; 4 The PRF Security of ZMAC; 4.1 XT Tweak Extension. 4.2 Collision Probability of ZHASH4.3 PRF Security of Finalization; 4.4 PRF Security of ZMAC; 4.5 Other Variants of ZMAC; 5 Application to Authenticated Encryption: ZAE; 6 MAC and AE Instances; 6.1 Handling the Domain Separation of TBC Instances; 6.2 Efficiency Comparisons; References; Message Franking via Committing Authenticated Encryption; 1 Introduction; 2 Preliminaries; 3 Message Franking and End-to-End Encryption; 4 Committing AEAD; 5 Are Existing AEAD Schemes Committing?; 5.1 Committing Encode-then-Encipher; 5.2 Encrypt-then-MAC; 5.3 MAC-then-Encrypt; 5.4 Some Non-binding AEAD Schemes. 6 Composing Commitment and AEAD7 Nonce-Based Committing AEAD and the CEP Construction; 8 Analysis of CEP; 9 Related Work; References; Key Rotation for Authenticated Encryption; 1 Introduction; 2 Updatable AE; 3 Confidentiality and Integrity for Updatable Encryption; 3.1 Message Confidentiality; 3.2 Ciphertext Integrity; 4 Practical Updatable AE Schemes; 4.1 Authenticated Encryption; 4.2 (In- )Security of AE-Hybrid Construction; 4.3 Improving AE-Hybrid; 5 Indistinguishability of Re-encryptions; 6 Revisiting the BLMR Scheme; 6.1 Negative Result About Provable UP-IND Security of BLMR. 7 An Updatable AE Scheme with Re-encryption Indistinguishability7.1 Security of ReCrypt; 7.2 Instantiating the Key-Homomorphic PRF; 7.3 Implementation and Performance; 8 Conclusion and Open Problems; A Bidirectional Updatable AE; A.1 XOR-KEM: A Bidirectional Updatable AE Scheme; References; Public-Key Encryption; Kurosawa-Desmedt Meets Tight Security; 1 Introduction; 2 Preliminaries; 2.1 Notations; 2.2 Hash Functions; 2.3 Prime-Order Groups; 2.4 Public-Key Encryption; 2.5 Key Encapsulation Mechanism; 3 Qualified Proof Systems; 4 The OR-Proof; 4.1 Public Parameters and the OR-Languages. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource (xv, 713 pages), illustrations
- Subjects:
- 005.8/24
Computer science
Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer security
Data encryption (Computer science)
Computers -- Hardware -- Network Hardware
Computers -- Security -- General
Computers -- Information Theory
Computers -- Social Aspects -- General
Computers -- Software Development & Engineering -- General
Network hardware
Computer security
Coding theory & cryptology
Ethical & social aspects of IT
Software Engineering
Data encryption (Computer science)
Computer Communication Networks
Computer security
Coding theory
Software engineering
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319636979
3319636979
3319636960
9783319636962 - Related ISBNs:
- 9783319636962
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed August 17, 2017).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.373689
- Ingest File:
- 02_354.xml