Dan Boneh (auth.), Xiaoyun Wang, Kazue Sako (eds.)'s Advances in Cryptology – ASIACRYPT 2012: 18th International PDF

By Dan Boneh (auth.), Xiaoyun Wang, Kazue Sako (eds.)

ISBN-10: 3642349609

ISBN-13: 9783642349607

ISBN-10: 3642349617

ISBN-13: 9783642349614

This publication constitutes the refereed court cases of the 18th foreign convention at the conception and alertness of Cryptology and data protection, Asiacrypt 2012, held in Beijing, China, in December 2012. The forty three complete papers provided have been conscientiously reviewed and chosen from 241 submissions. they're geared up in topical sections named: public-key cryptography, starting place, symmetric cipher, protection facts, lattice-based cryptography and quantity concept, hash functionality, cryptographic protocol, and implementation issues.

Show description

Read Online or Download Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings PDF

Similar international books

International Parallel and Distributed Processing Symposium, - download pdf or read online

This quantity originated from the 2003 overseas Parallel and allotted Processing Symposium, and examines dispensed computing and real-time platforms. it's meant for researchers, professors, practitioners and scholars.

Get Database Systems for Advanced Applications: 17th PDF

This quantity set LNCS 7238 and LNCS 7239 constitutes the refereed lawsuits of the seventeenth foreign convention on Database platforms for complicated purposes, DASFAA 2012, held in Busan, South Korea, in April 2012. The forty four revised complete papers and eight brief papers provided including 2 invited keynote papers, eight business papers, eight demo displays, four tutorials and 1 panel paper have been conscientiously reviewed and chosen from a complete of 159 submissions.

Get Building QoS into Distributed Systems: IFIP TC6 WG6.1 Fifth PDF

Welcome to IWQOS'97 in long island urban! over the last a number of years, there was a large amount of learn in the box of caliber of provider (QOS). a lot of that paintings has taken position in the context of QOS aid for disbursed multimedia platforms, working structures, delivery subsystems, networks, units and formal languages.

Additional info for Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings

Sample text

More precisely, this oracle takes a message as input, and produces a signature that is identically distributed to an output of the SignA algorithm (for the SK produced from the key generation). We say that a dual form signature is A-I matching if for all probabilistic polynomial-time (PPT) algorithms, A, there exists a negligible function, negl(λ), in the security parameter λ such that: P r[AOA (VK) ∈ / VI ] = negl(λ). This property guarantees that if an attacker is only given oracle access to SignA , then it is hard to create anything but a Type I forgery.

1) Can we have (X)RMA-secure schemes with a message space that is a simple Cartesian product of groups without sacrificing on efficiency? 2) The RMAsecure signature schemes developed in this paper are in fact XRMA-secure. Can we have more efficient schemes by resorting to RMA-security? 3) Can we have tagged one-time signature schemes with tight reduction to the underlying simple assumptions? 4) What is the exact lower bound for the size of signatures under simple assumptions? Is it possible to show such a bound?

LNCS, vol. 3376, pp. 136–153. Springer, Heidelberg (2005) 9. : Two-Tier Signatures, Strongly Unforgeable Signatures, and FiatShamir Without Random Oracles. , Wang, X. ) PKC 2007. LNCS, vol. 4450, pp. 201–216. Springer, Heidelberg (2007) 10. : Short Group Signatures. In: Franklin, M. ) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004) 11. : Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. ) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003) 12.

Download PDF sample

Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings by Dan Boneh (auth.), Xiaoyun Wang, Kazue Sako (eds.)


by Paul
4.1

Rated 4.50 of 5 – based on 33 votes