Advances in cryptology -- EUROCRYPT 2020 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings.: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings. Part II (2020)
- Record Type:
- Book
- Title:
- Advances in cryptology -- EUROCRYPT 2020 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings.: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings. Part II (2020)
- Main Title:
- Advances in cryptology -- EUROCRYPT 2020 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings.
- Other Titles:
- EUROCRYPT 2020
- Further Information:
- Note: Anne Canteaut, Yuval Ishai (eds.).
- Other Names:
- Canteaut, Anne
Ishai, Yuval
EUROCRYPT (Conference), 39th - Contents:
- Intro -- Preface -- Eurocrypt 2020 -- Contents -- Part II -- Generic Models -- Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability -- 1 Introduction -- 2 Oracle Cloning in NIST PQC Candidates -- 2.1 Design Process -- 2.2 The Base KEM -- 2.3 Submissions We Break -- 2.4 Submissions with Unclear Security -- 2.5 Submissions with Provable Security but Ambiguous Specification -- 2.6 Submissions with Clear Provable Security -- 3 Preliminaries -- 4 Read-Only Indifferentiability of Translating Functors -- 4.1 Functors and Read-Only Indifferentiability 4.2 Translating Functors -- 4.3 Rd-Indiff of Translating Functors -- 5 Analysis of Cloning Functors -- References -- On the Memory-Tightness of Hashed ElGamal -- 1 Introduction -- 1.1 Our Techniques -- 2 Preliminaries -- 2.1 Generic Group Model -- 2.2 Compression Lemma -- 2.3 Polynomials -- 2.4 Key Encapsulation Mechanism (KEM) -- 3 Memory Lower Bound on the ODH-SDH Reduction -- 3.1 Result and Proof Outline -- 4 Proof of Theorem -- 4.1 Adversary A Against ODH -- 4.2 The Shuffling Games -- 4.3 Proof of Lemma 3 -- 4.4 Memory Lower Bound When Zl (Proof of Lemma 4) -- 5 Conclusions -- References Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model -- 1 Introduction -- 2 Preliminaries -- 3 Schnorr Signatures -- 3.1 Definitions -- 3.2 Security of Schnorr Signatures in the AGM -- 4 Blind Schnorr Signatures -- 4.1 Definitions -- 4.2 The ROS Problem -- 4.3 Security of BlindIntro -- Preface -- Eurocrypt 2020 -- Contents -- Part II -- Generic Models -- Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability -- 1 Introduction -- 2 Oracle Cloning in NIST PQC Candidates -- 2.1 Design Process -- 2.2 The Base KEM -- 2.3 Submissions We Break -- 2.4 Submissions with Unclear Security -- 2.5 Submissions with Provable Security but Ambiguous Specification -- 2.6 Submissions with Clear Provable Security -- 3 Preliminaries -- 4 Read-Only Indifferentiability of Translating Functors -- 4.1 Functors and Read-Only Indifferentiability 4.2 Translating Functors -- 4.3 Rd-Indiff of Translating Functors -- 5 Analysis of Cloning Functors -- References -- On the Memory-Tightness of Hashed ElGamal -- 1 Introduction -- 1.1 Our Techniques -- 2 Preliminaries -- 2.1 Generic Group Model -- 2.2 Compression Lemma -- 2.3 Polynomials -- 2.4 Key Encapsulation Mechanism (KEM) -- 3 Memory Lower Bound on the ODH-SDH Reduction -- 3.1 Result and Proof Outline -- 4 Proof of Theorem -- 4.1 Adversary A Against ODH -- 4.2 The Shuffling Games -- 4.3 Proof of Lemma 3 -- 4.4 Memory Lower Bound When Zl (Proof of Lemma 4) -- 5 Conclusions -- References Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model -- 1 Introduction -- 2 Preliminaries -- 3 Schnorr Signatures -- 3.1 Definitions -- 3.2 Security of Schnorr Signatures in the AGM -- 4 Blind Schnorr Signatures -- 4.1 Definitions -- 4.2 The ROS Problem -- 4.3 Security of Blind Schnorr Signatures -- 5 The Clause Blind Schnorr Signature Scheme -- 6 Schnorr-Signed ElGamal Encryption -- References -- On Instantiating the Algebraic Group Model from Falsifiable Assumptions -- 1 Introduction -- 1.1 Technical Overview -- 1.2 Related Work -- 2 Preliminaries 2.1 Subset Membership Problem -- 2.2 Dual-mode NIWI -- 2.3 Probabilistic Indistinguishability Obfuscation -- 2.4 Re-randomizable and Fully Homomorphic Encryption -- 2.5 Statistically Correct Input Expanding pIO -- 3 How to Simulate Extraction -- Algebraic Wrappers -- 3.1 Group Schemes -- 3.2 An Algebraic Wrapper -- 3.3 Construction -- 4 How to Use Algebraic Wrappers -- Implementing Proofs from the AGM -- 4.1 Diffie-Hellman Assumptions -- 4.2 Schnorr Signatures -- References -- Secure Computation I -- Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era -- 1 Introduction 2 Model -- 3 Inapplicability of Strong BA Impossibility -- 3.1 Modeling a Communication-Restricted Network -- 3.2 The Impossibility Theorem, Revisited -- 4 Implementing a Communication-Restricted Network -- 5 Implementing a Registration Functionality -- 5.1 The Registration Functionality -- 5.2 The Identity-Assignment Protocol -- 6 Removing the Freshness Assumption -- References -- Efficient Constructions for Almost-Everywhere Secure Computation -- 1 Introduction -- 1.1 Previous Work -- 1.2 Our Contributions -- 1.3 Our Techniques -- 1.4 Related Work -- 1.5 Organization -- 2 Preliminaries … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource (866 p.)
- Subjects:
- 005.8/24
Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Electronic books
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783030457242
3030457249 - Related ISBNs:
- 9783030457235
- Notes:
- Note: Includes bibliographical references andc author index.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.508539
- Ingest File:
- 03_085.xml