Provable and Practical Security
Springer International Publishing (Verlag)
978-3-030-62575-7 (ISBN)
* The conference was held virtually due to the COVID-19 pandemic.
Signature Schemes.- Group Signature without Random Oracles from Randomizable Signatures.- Constant-size Lattice-Based Group Signature with Forward Security in the Standard Model.- A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model.- Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers.- Short Lattice Signatures in the Standard Model with Efficient Tag Generation.- One-Time Delegation of Unlinkable Signing Rights and Its Application.- Watermarkable Signature with Computational Function Preserving.- Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments.- Encryption Schemes and NIZKs.- Semi-Adaptively Secure Offine Witness Encryption from Puncturable Witness PRF.-Improved Indistinguishability for Searchable Symmetric Encryption.- Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions.- A Practical NIZK Argument for Confidential Transactions over Account-model Blockchain.- Secure Machine Learning and Multiparty Computation.- Secure Cumulative Reward Maximization in Linear Stochastic Bandits.- Secure Transfer Learning for Machine Fault Diagnosis under Different Operating Conditions.- Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring.- Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses.- Secret Sharing Schemes.- Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles.- Optimal Threshold Changeable Secret Sharing with New Threshold Change Range.- Security Analyses.- Key Recovery under Plaintext Checking Attack on LAC.- Security of Two NIST Candidates in the Presence of Randomness Reuse.
Erscheinungsdatum | 31.10.2020 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 423 p. 123 illus., 14 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 670 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • Applications • authentication • ciphertexts • Computer Science • Computer Security • Computer systems • conference proceedings • cryptography • data privacy • digital signature • electronic document identification systems • Encryption • formal security models • Informatics • privacy • privacy preserving • private key • provable security • Public Key Cryptography • Research |
ISBN-10 | 3-030-62575-3 / 3030625753 |
ISBN-13 | 978-3-030-62575-7 / 9783030625757 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich