Public-key cryptography -- PKC 2020 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020 proceedings.: 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020 proceedings. Part II (2020)
- Record Type:
- Book
- Title:
- Public-key cryptography -- PKC 2020 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020 proceedings.: 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020 proceedings. Part II (2020)
- Main Title:
- Public-key cryptography -- PKC 2020 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020 proceedings.
- Other Titles:
- PKC 2020
- Further Information:
- Note: Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas (eds.).
- Other Names:
- Kiayias, Aggelos
Kohlweiss, Markuff
Wallden, Petros
Zikas, Vassilis
International Workshop on Practice and Theory in Public Key Cryptography, 23rd - Contents:
- Intro -- Preface -- Organization -- Contents -- Part II -- Contents -- Part I -- Lattice-Based Cryptography -- The Randomized Slicer for CVPP: Sharper, Faster, Smaller, Batchier -- 1 Introduction -- 1.1 Contributions -- 1.2 Working Heuristics -- 2 Preliminaries -- 2.1 Notation -- 2.2 Spherical Geometry -- 2.3 Lattices -- 2.4 Solving CVPP with the Randomized Slicer -- 3 The Random Walk Model -- 4 Numerical Approximations -- 4.1 Discretization -- 4.2 Convex Optimization -- 4.3 Numerical Results -- 5 An Exact Solution for the Randomized Slicer -- 6 Memoryless Nearest Neighbour Searching 7 Bounded Distance Decoding with Preprocessing -- 8 Application to Graph-Based NNS -- References -- Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes -- 1 Introduction -- 1.1 Comparison with NIST Round2 Lattice-Based PKEs/KEMs -- 1.2 Comparison with NIST Round2 Lattice-Based Signatures -- 1.3 Organizations -- 2 Preliminaries -- 2.1 Notation -- 2.2 Definitions -- 2.3 High/Low Order Bits and Hints -- 3 An Improved KEM from AMLWE -- 3.1 Design Rationale -- 3.2 The Construction -- 3.3 Provable Security -- 3.4 Choices of Parameters 4 An Improved Signature from AMLWE and AMSIS -- 4.1 Design Rationale -- 4.2 The Construction -- 4.3 Provable Security -- 4.4 Choices of Parameters -- 5 Known Attacks Against AMLWE and AMSIS -- 5.1 Concrete Security of KEM -- 5.2 Concrete Security of SIG -- A Definitions of Hard Problems -- References -- MPSign: AIntro -- Preface -- Organization -- Contents -- Part II -- Contents -- Part I -- Lattice-Based Cryptography -- The Randomized Slicer for CVPP: Sharper, Faster, Smaller, Batchier -- 1 Introduction -- 1.1 Contributions -- 1.2 Working Heuristics -- 2 Preliminaries -- 2.1 Notation -- 2.2 Spherical Geometry -- 2.3 Lattices -- 2.4 Solving CVPP with the Randomized Slicer -- 3 The Random Walk Model -- 4 Numerical Approximations -- 4.1 Discretization -- 4.2 Convex Optimization -- 4.3 Numerical Results -- 5 An Exact Solution for the Randomized Slicer -- 6 Memoryless Nearest Neighbour Searching 7 Bounded Distance Decoding with Preprocessing -- 8 Application to Graph-Based NNS -- References -- Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes -- 1 Introduction -- 1.1 Comparison with NIST Round2 Lattice-Based PKEs/KEMs -- 1.2 Comparison with NIST Round2 Lattice-Based Signatures -- 1.3 Organizations -- 2 Preliminaries -- 2.1 Notation -- 2.2 Definitions -- 2.3 High/Low Order Bits and Hints -- 3 An Improved KEM from AMLWE -- 3.1 Design Rationale -- 3.2 The Construction -- 3.3 Provable Security -- 3.4 Choices of Parameters 4 An Improved Signature from AMLWE and AMSIS -- 4.1 Design Rationale -- 4.2 The Construction -- 4.3 Provable Security -- 4.4 Choices of Parameters -- 5 Known Attacks Against AMLWE and AMSIS -- 5.1 Concrete Security of KEM -- 5.2 Concrete Security of SIG -- A Definitions of Hard Problems -- References -- MPSign: A Signature from Small-Secret Middle-Product Learning with Errors -- 1 Introduction -- 1.1 Contributions -- 1.2 Comparison with Prior Works -- 2 Preliminaries -- 2.1 Polynomials and Matrices -- 2.2 Gaussian Distributions -- 2.3 Polynomial and Middle-Product Learning with Errors 2.4 Cryptographic Definitions -- 3 Hardness of Middle-Product LWE with Small Secrets -- 4 An Attack on Inhomogeneous PSIS with Small Secrets -- 5 A Signature Scheme Based on Small Secrets MPLWE -- 5.1 The Identification Scheme -- 5.2 The Signature Scheme -- 6 Concrete Parameters -- 7 Implementation -- References -- Proofs and Arguments II -- Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control -- 1 Introduction -- 1.1 Our Witness Indistinguishability Transformation -- 1.2 Application: Succinct Single-Round Access Control 1.3 Technical Overview of Our WI Transformation -- 2 Witness Indistinguishability for Any Argument System -- 2.1 Preliminaries -- 2.2 Private Remote Evaluation -- 2.3 Making Single-Round Protocols Witness Indistinguishable -- 3 Succinct Single-Round Access Control Scheme -- 3.1 Delegation for Batch-NP Families -- 3.2 Known Batch Delegation Schemes -- 3.3 Our Scheme -- 3.4 Proof of Theorem 3.7 for Our Construction -- References -- Boosting Verifiable Computation on Encrypted Data -- 1 Introduction -- 1.1 Ensuring Correctness of Privacy-Preserving Computation -- 1.2 Our Contributions … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource
- Subjects:
- 005.8/24
Public key cryptography -- Congresses
Computer security
Network security
Information technology: general issues
Network hardware
Computer networking & communications
Computers -- Security -- General
Computers -- Networking -- Security
Computers -- Social Aspects -- Human-Computer Interaction
Computers -- Hardware -- Network Hardware
Computers -- Networking -- General
Public key cryptography
Electronic books
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783030453886
- Related ISBNs:
- 303045388X
3030453871
9783030453879 - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.508508
- Ingest File:
- 03_085.xml