Advances in cryptology -- EUROCRYPT 2020 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings.: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings. Part I (2020)
- Record Type:
- Book
- Title:
- Advances in cryptology -- EUROCRYPT 2020 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings.: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings. Part I (2020)
- Main Title:
- Advances in cryptology -- EUROCRYPT 2020 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings.
- Other Titles:
- EUROCRYPT 2020
- Further Information:
- Note: Anne Canteaut, Yuval Ishai (eds.).
- Other Names:
- Canteaut, Anne
Ishai, Yuval
EUROCRYPT (Conference), 39th - Contents:
- Intro -- Preface -- Eurocrypt 2020 -- Fine-Grained Cryptography: A New Frontier? (Abstracts of Invited Talk) -- Contents -- Part I -- Contents -- Part II -- Contents -- Part III -- Invited Talk -- Mathematics and Cryptography: A Marriage of Convenience? -- 1 Introduction -- 2 Fruitful Interactions -- 3 Looking Toward the Future -- 3.1 Computing on Encrypted Data and Fully Homomorphic Encryption -- 3.2 Cryptographic Multilinear Maps -- 3.3 Cryptography that Will Survive Future Attacks -- 3.4 Cryptanalysis -- 4 Working Well Together -- Best Paper Awards Optimal Broadcast Encryption from Pairings and LWE -- 1 Introduction -- 1.1 Our Techniques -- 1.2 Related Works -- 2 Preliminaries -- 2.1 Attribute Based Encryption -- 2.2 Lattice Preliminaries -- 2.3 KP-ABE Scheme by Boneh et al. ch2BGGsps14 -- 2.4 Bilinear Map Preliminaries -- 3 Our Construction of CP-ABE -- 4 Security Proof for Our CP-ABE -- 5 Implications to CP-ABE, BE, and IBBE -- 5.1 New CP-ABE Scheme -- 5.2 New BE Scheme with Optimal Parameter Size -- References -- Private Information Retrieval with Sublinear Online Time -- 1 Introduction 1.1 A New Approach: Offline/Online PIR with Sublinear Online Time -- 1.2 Our Results -- 1.3 Limitations -- 1.4 Related Work -- 1.5 Technical Overview -- 1.6 Notation -- 2 Puncturable Pseudorandom Sets -- 2.1 Definitions -- 2.2 Constructions -- 2.3 Shifting Puncturable Pseudorandom Sets -- 3 Two-Server PIR with Sublinear Online Time -- 3.1 Definition -- 3.2 New Constructions -- 3.3Intro -- Preface -- Eurocrypt 2020 -- Fine-Grained Cryptography: A New Frontier? (Abstracts of Invited Talk) -- Contents -- Part I -- Contents -- Part II -- Contents -- Part III -- Invited Talk -- Mathematics and Cryptography: A Marriage of Convenience? -- 1 Introduction -- 2 Fruitful Interactions -- 3 Looking Toward the Future -- 3.1 Computing on Encrypted Data and Fully Homomorphic Encryption -- 3.2 Cryptographic Multilinear Maps -- 3.3 Cryptography that Will Survive Future Attacks -- 3.4 Cryptanalysis -- 4 Working Well Together -- Best Paper Awards Optimal Broadcast Encryption from Pairings and LWE -- 1 Introduction -- 1.1 Our Techniques -- 1.2 Related Works -- 2 Preliminaries -- 2.1 Attribute Based Encryption -- 2.2 Lattice Preliminaries -- 2.3 KP-ABE Scheme by Boneh et al. ch2BGGsps14 -- 2.4 Bilinear Map Preliminaries -- 3 Our Construction of CP-ABE -- 4 Security Proof for Our CP-ABE -- 5 Implications to CP-ABE, BE, and IBBE -- 5.1 New CP-ABE Scheme -- 5.2 New BE Scheme with Optimal Parameter Size -- References -- Private Information Retrieval with Sublinear Online Time -- 1 Introduction 1.1 A New Approach: Offline/Online PIR with Sublinear Online Time -- 1.2 Our Results -- 1.3 Limitations -- 1.4 Related Work -- 1.5 Technical Overview -- 1.6 Notation -- 2 Puncturable Pseudorandom Sets -- 2.1 Definitions -- 2.2 Constructions -- 2.3 Shifting Puncturable Pseudorandom Sets -- 3 Two-Server PIR with Sublinear Online Time -- 3.1 Definition -- 3.2 New Constructions -- 3.3 Construction of PIR from Puncturable Pseudorandom Sets -- 4 Two-Server PIR with Sublinear Amortized Time -- 4.1 Sketch of the Construction -- 5 Single-Server PIR with Sublinear Online Time 6 Lower Bound for PIR with Sublinear Online Time -- 7 Open Questions -- References -- Obfuscation and Functional Encryption -- Candidate iO from Homomorphic Encryption Schemes*-3pt -- 1 Introduction -- 1.1 Our Results -- 1.2 Technical Overview -- 1.3 Related Work -- 2 Preliminaries -- 2.1 Indistinguishability Obfuscation -- 2.2 Learning with Errors -- 3 Homomorphic Encryption -- 3.1 Linear Decrypt-and-Multiply -- 3.2 Split Decryption -- 3.3 Damgård-Jurik Encryption -- 4 Split Fully-Homomorphic Encryption -- 4.1 Construction in the Presence of an Oracle -- 4.2 Instantiating the Oracle 5 Split Fully-Homomorphic Encryption -3mu Obfuscation -- References -- Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE -- 1 Introduction -- 1.1 Our Techniques -- 2 Preliminaries -- 2.1 Noisy Linear Functional Encryption (NLinFE) -- 2.2 Sampling and Trapdoors -- 2.3 Random Matrices over Zq -- 3 Agrawal's Construction of Noisy Linear FE -- 4 Multi-ciphertext Attack on Agrawal's NLinFE -- 5 Rank Attack on Agrawal's NLinFE -- 5.1 Exploiting the Noise Obtained After Decrypting a Message -- 5.2 Rank Attack to Distinguish Bit … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource (805 p.)
- Subjects:
- 005.8/24
Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Electronic books
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783030457211
3030457214 - Related ISBNs:
- 9783030457204
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.508531
- Ingest File:
- 03_085.xml