Public-Key Cryptography - PKC 2022

Public-Key Cryptography - PKC 2022

25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part II

Watanabe, Yohei; Hanaoka, Goichiro; Shikata, Junji

Springer Nature Switzerland AG

02/2022

530

Mole

Inglês

9783030971304

15 a 20 dias

825

Descrição não disponível.
Key Exchange.- Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.- Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles.- Theory.- Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption.- Financially Backed Covert Security.- Lifting Standard Model Reductions to Common Setup Assumptions.- Encryption.- Efficient Lattice-Based Inner-Product Functional Encryption.- The Direction of Updatable Encryption Does Matter.- Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices.- Encapsulated Search Index : Public-Key, Sub-linear, Distributed, and Delegatable.- KDM Security for the Fujisaki-Okamoto Transformations in the QROM.- A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels.- Signatures.- Lattice-based Signatures with Tight Adaptive Corruptions and More.- Count Me In! Extendablity for Threshold Ring Signatures.- A Note on the Post-Quantum Security of (Ring) Signatures.- Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model.- On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.- Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
access control;advanced cryptography;authentication;computer networks;computer security;cryptanalysis;cryptographic protocol;cryptography;data privacy;data security;electronic document identification systems;encryption;key exchange;multi-party computation;network protocols;network security;public key cryptography;public key encryption;secret sharing;zero-knowledge proof