Download Advances in Cryptology – ASIACRYPT 2012: 18th International by Dan Boneh (auth.), Xiaoyun Wang, Kazue Sako (eds.) PDF

By Dan Boneh (auth.), Xiaoyun Wang, Kazue Sako (eds.)

This publication constitutes the refereed court cases of the 18th foreign convention at the idea and alertness of Cryptology and data safeguard, Asiacrypt 2012, held in Beijing, China, in December 2012. The forty three complete papers awarded have been rigorously reviewed and chosen from 241 submissions. they're geared up in topical sections named: public-key cryptography, starting place, symmetric cipher, safeguard facts, lattice-based cryptography and quantity thought, hash functionality, cryptographic protocol, and implementation issues.

Show description

Read or Download Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings PDF

Similar international books

Compiler Construction: 20th International Conference, CC 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26–April 3, 2011. Proceedings

This ebook constitutes the refereed complaints of the twentieth foreign convention on Compiler building, CC 2011, held in Saarbrücken, Germany, March 26—April three, 2011, as a part of ETAPS 2011, the eu Joint meetings on concept and perform of software program. The 15 revised complete papers offered including the summary of 1 invited speak have been rigorously reviewed and chosen from fifty two submissions.

Artificial Intelligence Applications and Innovations: 9th IFIP WG 12.5 International Conference, AIAI 2013, Paphos, Cyprus, September 30 – October 2, 2013, Proceedings

This publication constitutes the refereed complaints of the ninth IFIP WG 12. five overseas convention on synthetic Intelligence functions and recommendations, AIAI 2013, held in Paphos, Cyprus, in September/October 2013. The 26 revised complete papers offered including a keynote speech on the major occasion and forty four papers of eight collocated workshops have been conscientiously reviewed and chosen for inclusion within the quantity.

Structures and Norms in Science: Volume Two of the Tenth International Congress of Logic, Methodology and Philosophy of Science, Florence, August 1995

This publication offers a state of the art survey of present learn in good judgment and philosophy of technological know-how, as seen via invited audio system chosen via the main prestigious foreign association within the box. specifically, it offers a coherent photo of foundational examine into a few of the sciences, either normal and social.

Additional info for Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings

Sample text

LNCS, vol. 5350, pp. 179–197. Springer, Heidelberg (2008) 28. : Practical Adaptive Oblivious Transfer from Simple Assumptions. In: Ishai, Y. ) TCC 2011. LNCS, vol. 6597, pp. 347–363. Springer, Heidelberg (2011) 29. : Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures. , Chen, K. ) ASIACRYPT 2006. LNCS, vol. 4284, pp. 444–459. Springer, Heidelberg (2006) 30. : Efficient Non-interactive Proof Systems for Bilinear Groups. P. ) EUROCRYPT 2008. LNCS, vol. 4965, pp.

KeyGen = KeyGenDF , Sign = SignDF A , Verify = Verify Our new secure signature scheme is identical to the dual form system except that we have arbitrarily chosen to use SignA as our signing algorithm. We could have equivalently elected to use SignB . (In which case, we would modify the dual-oracle invariance property to be with respect to Type II forgeries instead of Type I forgeries. ) Now we will prove that this signature scheme is secure. In the full version, we prove (the argument is rather straightforward): DF DF ) is a secure dual Theorem 1.

Applications. Structure-preserving signatures (SPS) have become a mainstay in cryptographic protocol design in recent years. From the many applications that benefit from efficient SPS based on simple assumptions, we list only a few recent examples. Using our SIG1 scheme from Section 5 both the construction of a group signature scheme with efficient revocation by Libert, Peters and Yung [33] and the construction of compact verifiable shuffles by Chase et al. [16] can be proven purely under the DLIN assumption.

Download PDF sample

Rated 4.74 of 5 – based on 15 votes