Public-key cryptography -- PKC 2020 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020 proceedings.: 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020 proceedings. Part I (2020)
- Record Type:
- Book
- Title:
- Public-key cryptography -- PKC 2020 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020 proceedings.: 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020 proceedings. Part I (2020)
- Main Title:
- Public-key cryptography -- PKC 2020 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020 proceedings.
- Other Titles:
- PKC 2020
- Further Information:
- Note: Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas (eds.).
- Other Names:
- Kiayias, Aggelos
Kohlweiss, Markuff
Wallden, Petros
Zikas, Vassilis
International Workshop on Practice and Theory in Public Key Cryptography, 23rd - Contents:
- Intro -- Preface -- Organization -- How Low Can We Go? (Invited Talk) -- Contents -- Part I -- Contents -- Part II -- Functional Encryption -- Fast, Compact, and Expressive Attribute-Based Encryption -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Design of Our ABE Schemes -- 1.3 Our Main Technique -- 1.4 Other Techniques -- 1.5 Implementation and Evaluation -- 2 Preliminaries -- 2.1 Notation -- 2.2 Basic Tools -- 2.3 Attribute-Based Encryption -- 2.4 Piecewise Guessing Framework -- 2.5 Pebbling Strategy for Boolean Formula -- 3 Our KP-ABE Scheme 3.1 Linear Secret Sharing for Boolean Formulae -- 3.2 Construction -- 3.3 Security -- 4 Adaptive Security for Core Component -- 5 Implementation and Evaluation -- References -- Adaptive Simulation Security for Inner Product Functional Encryption -- 1 Introduction -- 2 Preliminaries -- 2.1 Useful Lemmas -- 2.2 Functional Encryption -- 2.3 Security -- 2.4 Hardness Assumptions -- 3 Adaptive Simulation-Based Security from DDH -- 4 Adaptive Simulation-Based Security for Inner Products over Z from DCR -- 5 Adaptive Simulation-Based Security for Inner Products Mod P from LWE -- 5.1 Construction 5.2 Proof of Security for AdSimIPFE -- References -- Verifiable Inner Product Encryption Scheme -- 1 Introduction -- 1.1 Our Results and Applications -- 1.2 Technical Overview -- 1.3 Related Work and Comparison -- 2 Preliminaries -- 2.1 Building Blocks -- 2.2 Hardness Assumptions -- 3 Our Perfectly Correct Inner-Product Encryption -- 3.1 SecurityIntro -- Preface -- Organization -- How Low Can We Go? (Invited Talk) -- Contents -- Part I -- Contents -- Part II -- Functional Encryption -- Fast, Compact, and Expressive Attribute-Based Encryption -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Design of Our ABE Schemes -- 1.3 Our Main Technique -- 1.4 Other Techniques -- 1.5 Implementation and Evaluation -- 2 Preliminaries -- 2.1 Notation -- 2.2 Basic Tools -- 2.3 Attribute-Based Encryption -- 2.4 Piecewise Guessing Framework -- 2.5 Pebbling Strategy for Boolean Formula -- 3 Our KP-ABE Scheme 3.1 Linear Secret Sharing for Boolean Formulae -- 3.2 Construction -- 3.3 Security -- 4 Adaptive Security for Core Component -- 5 Implementation and Evaluation -- References -- Adaptive Simulation Security for Inner Product Functional Encryption -- 1 Introduction -- 2 Preliminaries -- 2.1 Useful Lemmas -- 2.2 Functional Encryption -- 2.3 Security -- 2.4 Hardness Assumptions -- 3 Adaptive Simulation-Based Security from DDH -- 4 Adaptive Simulation-Based Security for Inner Products over Z from DCR -- 5 Adaptive Simulation-Based Security for Inner Products Mod P from LWE -- 5.1 Construction 5.2 Proof of Security for AdSimIPFE -- References -- Verifiable Inner Product Encryption Scheme -- 1 Introduction -- 1.1 Our Results and Applications -- 1.2 Technical Overview -- 1.3 Related Work and Comparison -- 2 Preliminaries -- 2.1 Building Blocks -- 2.2 Hardness Assumptions -- 3 Our Perfectly Correct Inner-Product Encryption -- 3.1 Security Reduction to DLin and DBDH -- 4 Verifiable Inner-Product Encryption -- 4.1 Our Construction -- 5 NIWI Proofs and Verification Algorithms -- 5.1 How to Handle Generalized or Statements -- 5.2 OR Proof in the General Case 5.3 Master Public Key Verification -- 5.4 Token Verification Algorithms -- 5.5 NIWIenc=""426830A Penc, Venc""526930B : NIWI-Proof for Encryption Algorithm -- 6 Conclusion -- References -- A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials -- 1 Introduction -- 2 Preliminaries -- 2.1 Notations -- 2.2 Pairing Groups -- 2.3 Functional Encryption -- 2.4 Quasi-Adaptive Non-Interactive Zero-Knowledge -- 3 Quadratic FE from Inner-Product FE -- 3.1 Partially Function-Hiding Inner-Product FE -- 3.2 Quadratic FE from Partially Function-Hiding Inner-Product FE 4 Partially-Hiding Inner Product FE -- References -- Identity-Based Encryption -- Master-Key KDM-Secure IBE from Pairings -- 1 Introduction -- 1.1 Our Contributions and Open Problems -- 1.2 General Overview of Our Construction -- 1.3 First Attempt: Dual System Encryption -- 1.4 Final Attempt: Handling Many Challenge Ciphertexts -- 2 Preliminaries -- 2.1 Pairing Groups -- 2.2 Entropy Extraction -- 2.3 Identity Based Encryption -- 3 KDM-Secure IBE from Pairings -- 3.1 Ingredients of Our Construction -- 3.2 KDM-Secure IBE Construction -- 3.3 Concrete Instantiations -- References … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource
- Subjects:
- 005.8/24
Public key cryptography -- Congresses
Computer security
Network security
Network hardware
Coding theory & cryptology
Information technology: general issues
Computers -- Security -- General
Computers -- Networking -- Security
Computers -- Hardware -- Network Hardware
Computers -- Information Theory
Computers -- Social Aspects -- Human-Computer Interaction
Public key cryptography
Electronic books
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783030453749
- Related ISBNs:
- 303045374X
3030453731
9783030453732 - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.508505
- Ingest File:
- 03_085.xml