Advances in Cryptology – ASIACRYPT 2012: 18th International by Dan Boneh (auth.), Xiaoyun Wang, Kazue Sako (eds.) PDF

  • admin
  • February 14, 2018
  • International
  • Comments Off on Advances in Cryptology – ASIACRYPT 2012: 18th International by Dan Boneh (auth.), Xiaoyun Wang, Kazue Sako (eds.) PDF

By Dan Boneh (auth.), Xiaoyun Wang, Kazue Sako (eds.)

ISBN-10: 3642349609

ISBN-13: 9783642349607

ISBN-10: 3642349617

ISBN-13: 9783642349614

This publication constitutes the refereed lawsuits of the 18th overseas convention at the conception and alertness of Cryptology and data safeguard, Asiacrypt 2012, held in Beijing, China, in December 2012. The forty three complete papers offered have been conscientiously reviewed and chosen from 241 submissions. they're prepared in topical sections named: public-key cryptography, beginning, symmetric cipher, protection facts, lattice-based cryptography and quantity idea, hash functionality, cryptographic protocol, and implementation issues.

Show description

Read or Download Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings PDF

Best international books

Algebraic and Numeric Biology: 4th International Conference, - download pdf or read online

This ebook constitutes the refereed court cases of the 4th overseas convention on Algebraic Biology, ANB 2010, held on the fort of Hagenberg, Austria in July/August 2010. The convention is a keep on with up of the AB convention. the ten papers have been rigorously reviewed and chosen from a variety of submissions.

Formal Verification of Object-Oriented Software: by June Andronick (auth.), Bernhard Beckert, Claude Marché PDF

This ebook provides the completely refereed post-conference complaints of the overseas convention on Formal Verification of Object-Oriented software program, FoVeOOS 2010, held in Paris, France, in June 2010 - organised through price motion IC0701. The eleven revised complete papers provided including 2 invited talks have been conscientiously reviewed and chosen from 21 submissions.

Extra info for Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings

Sample text

Algorithm B cma dlin such that AdvufSIG1,A (λ) ≤ (qs + 3) · AdvG,B (λ) + 1/p. Constant-Size Structure-Preserving Signatures under Simple Assumptions 19 6 Instantiating SIG2 We instantiate the POS and xSIG building blocks of our second generic construction to obtain our second SPS scheme. Here we choose the Type-III bilinear group setting. The resulting SIG2 scheme is an efficient structure-preserving signature scheme based on SXDH and XDLIN. Setup for Type-III groups. The following setup procedure is common for all building blocks in this section.

A natural future direction is to complement our work by discovering prime order analogs of our techniques. Many previous systems were originally constructed in composite order groups and later transferred into prime order groups [16,34,18,33,19,47,35,38,37,28,29,40,46]. The general techniques presented in [28,39] do not seem directly applicable here, but we emphasize that our dual form framework is not tied to composite order groups and could also be used in the prime order setting. Discussion of additional related works can be found in the full version.

For a message in Gk11 × Gk22 , the above POSb uses a public-key of size (k + 2, k + 1), yields a one-time public-key of size (0, 1) (for mode = normal) or (0, 3) (for mode = extended), and a signature of size (3, 2). Verification requires 2 pairing product equations. A one-time public-key in extended mode, which is treated as a message to xSIG ˆ a ) ∈ G32 . Structure-preservance and in this section, is of the form opk = (Fˆ2a , Fˆ3a , U uniform public-key property are taken over from the underlying POSu1 and POSu2.

Download PDF sample

Advances in Cryptology – ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings by Dan Boneh (auth.), Xiaoyun Wang, Kazue Sako (eds.)


by Charles
4.4

Rated 4.50 of 5 – based on 28 votes