Download Advances in Cryptology - ASIACRYPT 2013: 19th International by Charanjit S. Jutla, Arnab Roy (auth.), Kazue Sako, Palash PDF

By Charanjit S. Jutla, Arnab Roy (auth.), Kazue Sako, Palash Sarkar (eds.)

The two-volume set LNCS 8269 and 8270 constitutes the refereed lawsuits of the nineteenth foreign convention at the thought and alertness of Cryptology and data, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The fifty four revised complete papers provided have been conscientiously chosen from 269 submissions. they're prepared in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and research, side-channel cryptanalysis, message authentication codes, signatures, cryptography established upon actual assumptions, multi-party computation, cryptographic primitives, research, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Show description

Read or Download Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I PDF

Best international_1 books

International Handbook of Personal Construct Psychology

Own build Psychology (PCP) used to be devised via George Kelly in 1955 as a brand new process in psychotherapy. due to the fact then, his thoughts were utilized broadly all through psychology and past, to incorporate components as various as nursing, clash answer, sociology and literary feedback. This instruction manual brings jointly, for the 1st time, a variety of theories, study and perform that experience grown out of Kelly's unique notion.

Cryptology and Network Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings

This e-book constitutes the refereed court cases of the thirteenth overseas convention on Cryptology and community safeguard, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised complete papers offered including the abstracts of three invited talks have been conscientiously reviewed and chosen from 86 submissions.

Mobile, Secure, and Programmable Networking: Second International Conference, MSPN 2016, Paris, France, June 1-3, 2016, Revised Selected Papers

This ebook constitutes the completely refereed post-conference court cases of the second one overseas convention on cellular, safe and Programmable Networking, held in Paris, France, This publication constitutes the completely refereed post-conference court cases of the second one foreign convention on cellular, safe and Programmable Networking, held in Paris, France, in June 2016.

Additional info for Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I

Sample text

Org/ 16. : Round-optimal password-based authenticated key exchange. In: Ishai, Y. ) TCC 2011. LNCS, vol. 6597, pp. 293–310. Springer, Heidelberg (2011) 17. : Tools for simulating features of composite order bilinear groups in the prime order setting. , Johansson, T. ) EUROCRYPT 2012. LNCS, vol. 7237, pp. 318–335. Springer, Heidelberg (2012) 18. : Public-key cryptosystems provably secure against chosen ciphertext attacks. In: 22nd ACM STOC Annual ACM Symposium on Theory of Computing. ACM Press (May 1990) 19.

This leads to a proof of soundness of the QA-NIZK. Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces 11 Remark. Observe from the proof above that the soundness can be based on the following computational assumption which is implied by XDH, which is a decisional assumption: Definition 1. Consider a generation algorithm G taking the security parameter as input, that outputs a tuple (q, G1 , G2 , GT , e, g1 , g2 ), where G1 , G2 and GT are groups of prime order q with generators g1 , g2 and e(g1 , g2 ) respectively and which allow an efficiently computable Zq -bilinear pairing map e : G1 × G2 → GT .

This slot now constitutes a “hard statement” certified by the verifier: it could be used by the prover in any session (with this verifier). If the prover could prove that he has a signed slot such that the machine committed to in this slot could output the verifier random string in this slot, the verifier would be instructed to accept. Thus, the simulator would now simply take the first slot that completes (across all sessions), and, would prove the resulting “hard statement” in the universal arguments of all the sessions.

Download PDF sample

Rated 4.40 of 5 – based on 46 votes

admin