Amazon cover image
Image from Amazon.com

Advances in cryptology -- ASIACRYPT 2024 : 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part II / Kai-Min Chung, Yu Sasaki, editors.

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 15485.Publisher: Singapore : Springer, 2024Description: 1 online resource (500 p.)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9789819608881
  • 9819608880
Other title:
  • ASIACRYPT 2024
Subject(s): DDC classification:
  • 005.8 23/eng/20250103
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Intro -- Preface -- Organization -- Contents - Part II -- Digital Signatures -- On Security Proofs of Existing Equivalence Class Signature Schemes -- 1 Introduction -- 2 Preliminaries -- 3 A Flaw in the Security Proofs of KSD19 and CLP22 -- 4 The Security of FHS in the AGM -- References -- Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank -- 1 Introduction -- 2 Preliminaries -- 2.1 Notations -- 2.2 Secret Sharing -- 2.3 Rank Metric and Hard Problems for Cryptography -- 3 Security and Parameters for RSDs and MinRank
3.1 Security of the Rank Syndrome Decoding Problem -- 3.2 Parameters Choice for RSDs -- 3.3 Parameters Choice for MinRank -- 4 MPCitH Modeling for RSDs and MinRank -- 4.1 Modelings for the RSDs Problem -- 4.2 Modelings for the MinRank Problem -- 5 The TCitH and VOLEitH Frameworks -- 5.1 Threshold-Computation-in-the-Head Framework -- 5.2 VOLE-in-the-Head Framework -- 5.3 Additional MPCitH Optimisations -- 6 New Signatures Based on RSDs and MinRank -- 6.1 New Signatures Based on RSDs -- 6.2 New Signatures Based on MinRank -- References
Non-Interactive Blind Signatures: Post-Quantum and Stronger Security -- 1 Introduction -- 2 Technical Overview -- 2.1 Defining Non-Interactive Blind Signatures -- 2.2 Extending Fischlin's Paradigm to NIBS -- 2.3 A New Template: Circuit-Private LHE to NIBS -- 2.4 Making Fischlin-Based NIBS Practical and Post-Quantum -- 2.5 Security and the Randomized OM-ISIS Assumption -- 2.6 Efficiency Comparisons for Our NIBS Schemes -- 3 Preliminaries -- 3.1 Lattice Preliminaries -- 4 A Stronger Model for Non-Interactive Blind Signatures -- 5 NIBS from Circuit Private LHE -- 5.1 Construction
6 The Randomized One-More ISIS Assumption -- 7 Lattice-Based NIBS -- 7.1 Construction -- A Knowledge of Secret Key Assumption -- References -- Dictators? Friends? Forgers. -- 1 Introduction -- 1.1 Strengthening Robustness to Dictator Unforgeability -- 1.2 Strengthening Private Anamorphism to Recipient Unforgeability -- 1.3 Related Work -- 1.4 Outline of This Paper -- 2 Notation and Preliminaries -- 2.1 Pseudocode, Sets, and Tables -- 2.2 Cryptographic Primitives and Preliminaries -- 3 Background on Anamorphic Signatures -- 3.1 Anamorphic Signature Schemes -- 3.2 Constructing Anamorphic Signatures
4 Strengthening Robustness to Dictator Unforgeability -- 4.1 Robustness (for Anamorphic Signatures) -- 4.2 Constructing Robust Anamorphic Signatures -- 4.3 Dictator Unforgeability -- 4.4 RIdP with UP-KC-Secure Signatures -- 4.5 An Attack on RIdPX -- 5 Strengthening Private Anamorphism to Recipient Unforgeability -- 5.1 Private Anamorphism -- 5.2 A Simple Attack -- 5.3 Recipient Unforgeability -- 5.4 An Attack on RRep -- 5.5 RRep with SUF-CRA-Secure Signatures -- 5.6 RRep with SUF-CMA-Secure Signatures -- 5.7 Dictator and Recipient Unforgeable Schemes -- References
Summary: The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 913, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Intro -- Preface -- Organization -- Contents - Part II -- Digital Signatures -- On Security Proofs of Existing Equivalence Class Signature Schemes -- 1 Introduction -- 2 Preliminaries -- 3 A Flaw in the Security Proofs of KSD19 and CLP22 -- 4 The Security of FHS in the AGM -- References -- Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank -- 1 Introduction -- 2 Preliminaries -- 2.1 Notations -- 2.2 Secret Sharing -- 2.3 Rank Metric and Hard Problems for Cryptography -- 3 Security and Parameters for RSDs and MinRank

3.1 Security of the Rank Syndrome Decoding Problem -- 3.2 Parameters Choice for RSDs -- 3.3 Parameters Choice for MinRank -- 4 MPCitH Modeling for RSDs and MinRank -- 4.1 Modelings for the RSDs Problem -- 4.2 Modelings for the MinRank Problem -- 5 The TCitH and VOLEitH Frameworks -- 5.1 Threshold-Computation-in-the-Head Framework -- 5.2 VOLE-in-the-Head Framework -- 5.3 Additional MPCitH Optimisations -- 6 New Signatures Based on RSDs and MinRank -- 6.1 New Signatures Based on RSDs -- 6.2 New Signatures Based on MinRank -- References

Non-Interactive Blind Signatures: Post-Quantum and Stronger Security -- 1 Introduction -- 2 Technical Overview -- 2.1 Defining Non-Interactive Blind Signatures -- 2.2 Extending Fischlin's Paradigm to NIBS -- 2.3 A New Template: Circuit-Private LHE to NIBS -- 2.4 Making Fischlin-Based NIBS Practical and Post-Quantum -- 2.5 Security and the Randomized OM-ISIS Assumption -- 2.6 Efficiency Comparisons for Our NIBS Schemes -- 3 Preliminaries -- 3.1 Lattice Preliminaries -- 4 A Stronger Model for Non-Interactive Blind Signatures -- 5 NIBS from Circuit Private LHE -- 5.1 Construction

6 The Randomized One-More ISIS Assumption -- 7 Lattice-Based NIBS -- 7.1 Construction -- A Knowledge of Secret Key Assumption -- References -- Dictators? Friends? Forgers. -- 1 Introduction -- 1.1 Strengthening Robustness to Dictator Unforgeability -- 1.2 Strengthening Private Anamorphism to Recipient Unforgeability -- 1.3 Related Work -- 1.4 Outline of This Paper -- 2 Notation and Preliminaries -- 2.1 Pseudocode, Sets, and Tables -- 2.2 Cryptographic Primitives and Preliminaries -- 3 Background on Anamorphic Signatures -- 3.1 Anamorphic Signature Schemes -- 3.2 Constructing Anamorphic Signatures

4 Strengthening Robustness to Dictator Unforgeability -- 4.1 Robustness (for Anamorphic Signatures) -- 4.2 Constructing Robust Anamorphic Signatures -- 4.3 Dictator Unforgeability -- 4.4 RIdP with UP-KC-Secure Signatures -- 4.5 An Attack on RIdPX -- 5 Strengthening Private Anamorphism to Recipient Unforgeability -- 5.1 Private Anamorphism -- 5.2 A Simple Attack -- 5.3 Recipient Unforgeability -- 5.4 An Attack on RRep -- 5.5 RRep with SUF-CRA-Secure Signatures -- 5.6 RRep with SUF-CMA-Secure Signatures -- 5.7 Dictator and Recipient Unforgeable Schemes -- References

Digital Signatures with Outsourced Hashing

The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 913, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.

Includes author index.

Online resource; title from PDF title page (SpringerLink, viewed January 3, 2025).

Powered by Koha