Candidate Multilinear Maps

Candidate Multilinear Maps

Author: Sanjam Garg

Publisher:

Published: 2013

Total Pages: 122

ISBN-13:

DOWNLOAD EBOOK

In this thesis, we describe plausible lattice-based constructions with properties that approximate the sought-after multilinear maps in hard-discrete-logarithm groups. The security of our constructions relies on seemingly hard problems in ideal lattices, which can be viewed as extensions of the assumed hardness of the NTRU function. These new constructions radically enhance our tool set and open a floodgate of applications.


Theory of Cryptography

Theory of Cryptography

Author: Martin Hirt

Publisher: Springer

Published: 2016-10-24

Total Pages: 586

ISBN-13: 3662536447

DOWNLOAD EBOOK

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key encryption; obfuscation and multilinear maps; attribute-based encryption; functional encryption; secret sharing; new models.


Theory of Cryptography

Theory of Cryptography

Author: Amos Beimel

Publisher: Springer

Published: 2018-11-07

Total Pages: 732

ISBN-13: 3030038106

DOWNLOAD EBOOK

The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018. The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.


Attacks on Multilinear Maps

Attacks on Multilinear Maps

Author: William B. Cyr

Publisher:

Published: 2015

Total Pages: 44

ISBN-13:

DOWNLOAD EBOOK

In this thesis, I explore the current multilinear map candidates and attacks against them. This involves analyzing the three proposals for multilinear maps which are based on ideal lattices, integers, and standard lattices. The attacks exploit the geometry of the lattices and linearity of the integers to break security. I also compare the applications of these schemes with what is required for attacks. Key agreement seems to need certain features of multilinear maps which expose vulnerabilities while other applications like indistinguishability obfuscation. I analyze the attacks against these maps and show why they are not able to break the program obfuscation application of multilinear maps.


Theory of Cryptography

Theory of Cryptography

Author: Eyal Kushilevitz

Publisher: Springer

Published: 2015-12-21

Total Pages: 623

ISBN-13: 366249096X

DOWNLOAD EBOOK

The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereedproceedings of the 13th International Conference on Theory ofCryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016. The 45 revised full papers presented were carefully reviewed andselected from 112 submissions. The papers are organized in topicalsections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also includes an invited talk on cryptographic assumptions.


Theory of Cryptography

Theory of Cryptography

Author: Yevgeniy Dodis

Publisher: Springer

Published: 2015-03-09

Total Pages: 715

ISBN-13: 3662464977

DOWNLOAD EBOOK

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.


Progress in Cryptology -- INDOCRYPT 2015

Progress in Cryptology -- INDOCRYPT 2015

Author: Alex Biryukov

Publisher: Springer

Published: 2015-11-27

Total Pages: 381

ISBN-13: 3319266179

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 16th International Conference on Cryptology in India, INDOCRYPT 2015, held in Bangalore, India, in December 2015. The 19 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on public key encryption; cryptanalysis; side channel attacks; information theoretic cryptography; and lightweight cryptography.


Security and Cryptography for Networks

Security and Cryptography for Networks

Author: Vassilis Zikas

Publisher: Springer

Published: 2016-08-10

Total Pages: 606

ISBN-13: 3319446185

DOWNLOAD EBOOK

This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. They are organized in topical sections on encryption; memory protection; multi-party computation; zero-knowledge proofs; efficient protocols; outsourcing computation; digital signatures; cryptanalysis; two-party computation; secret sharing; and obfuscation.


Advances in Cryptology – ASIACRYPT 2022

Advances in Cryptology – ASIACRYPT 2022

Author: Shweta Agrawal

Publisher: Springer Nature

Published: 2023-01-24

Total Pages: 846

ISBN-13: 3031229630

DOWNLOAD EBOOK

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.


Innovative Security Solutions for Information Technology and Communications

Innovative Security Solutions for Information Technology and Communications

Author: Peter Y.A. Ryan

Publisher: Springer Nature

Published: 2022-10-12

Total Pages: 345

ISBN-13: 3031175107

DOWNLOAD EBOOK

This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 14th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2021, which was held virtually in November 2021. The 22 full papers included in this book were carefully reviewed and selected from 40 submissions. They deal with emergent topics in security and privacy from different communities.