Advances in Cryptology - ASIACRYPT 2013: 19th International by Charanjit S. Jutla, Arnab Roy (auth.), Kazue Sako, Palash

By Charanjit S. Jutla, Arnab Roy (auth.), Kazue Sako, Palash Sarkar (eds.)

The two-volume set LNCS 8269 and 8270 constitutes the refereed complaints of the nineteenth overseas convention at the idea and alertness of Cryptology and knowledge, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The fifty four revised complete papers offered have been rigorously chosen from 269 submissions. they're geared up in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and research, side-channel cryptanalysis, message authentication codes, signatures, cryptography dependent upon actual assumptions, multi-party computation, cryptographic primitives, research, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Show description

Read or Download Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I PDF

Similar international_1 books

Semiconductor Superlattices and Interfaces. Proceedings of the International School of Physics “Enrico Fermi”

This publication is worried with the dynamic box of semiconductor microstructures and interfaces. numerous issues within the primary homes of interfaces, superlattices and quantum wells are integrated, as are papers on development recommendations and purposes. The papers take care of the interplay of concept, experiments and purposes in the box, and the phenomenal contributions are from either the tutorial and commercial worlds

International Electronics Directory '90. The Guide to European Manufacturers, Agents and Applications

Overseas Electronics listing '90, 3rd variation: The consultant to eu brands, brokers and purposes, half 1 includes a listing of assorted brands in Europe and a listing of brokers in Europe. This ebook encompasses a categorized listing of digital services and products the place either brands and brokers are indexed.

Field and Service Robotics: Results of the 8th International Conference

FSR, the foreign convention on box and repair Robotics, is the top unmarried music convention of robotics for box and repair purposes. This ebook provides the result of FSR2012, the 8th convention of box and repair Robotics, which was once initially deliberate for 2011 with the venue of Matsushima in Tohoku quarter of Japan.

Supercomputing: 29th International Conference, ISC 2014, Leipzig, Germany, June 22-26, 2014. Proceedings

This ebook constitutes the refereed complaints of the twenty ninth overseas Supercomputing convention, ISC 2014, held in Leipzig, Germany, in June 2014. The 34 revised complete papers provided jointly have been conscientiously reviewed and chosen from seventy nine submissions. The papers disguise the subsequent issues: scalable functions with 50K+ cores; advances in algorithms; medical libraries; programming types; architectures; functionality versions and research; automated functionality optimization; parallel I/O and effort potency.

Additional resources for Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I

Sample text

LNCS, vol. 5677, pp. 619– 636. Springer, Heidelberg (2009) A Dual System IBE under SXDH Assumption For ease of reading, we switch to multiplicative group notation in the following. Setup: The authority uses a group generation algorithm for which the SXDH assumption holds to generate a bilinear group (G1 , G2 , GT ) with g1 and g2 as generators of G1 and G2 respectively. Assume that G1 and G2 are of order q, and let e be a bilinear pairing on G1 × G2 . Then it picks c at random from Zq , and sets f = gc2 .

In: Krawczyk, H. ) CRYPTO 1998. LNCS, vol. 1462, pp. 26–45. Springer, Heidelberg (1998) 2. : Random oracles are practical: A paradigm for designing efficient protocols. In: Ashby, V. ) ACM CCS 1993, pp. 62–73. ACM Press (November 1993) 3. : Non-interactive zero-knowledge and its applications (extended abstract). In: STOC, pp. 103–112 (1988) 4. : Chosen-ciphertext security from identity-based encryption. SIAM J. Comput. 36(5), 1301–1328 (2007) 7 [6] have recently and independently obtained a short IBE under SXDH, but our IBE ciphertexts are even shorter.

Springer, Heidelberg (2011) 12. : Simulation-sound NIZK proofs for a practical language and constant size group signatures. , Chen, K. ) ASIACRYPT 2006. LNCS, vol. 4284, pp. 444–459. Springer, Heidelberg (2006) 13. : Efficient non-interactive proof systems for bilinear groups. P. ) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415–432. Springer, Heidelberg (2008) 14. : Relatively-sound NIZKs and password-based key-exchange. , Manulis, M. ) PKC 2012. LNCS, vol. 7293, pp. 485–503. Springer, Heidelberg (2012) 15.

Download PDF sample

Rated 4.93 of 5 – based on 46 votes