Applied Cryptography and Network Security: 13th by Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis

By Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis

This e-book constitutes the refereed lawsuits of the thirteenth overseas convention on utilized Cryptography and community safeguard, ACNS 2015, held in ny, new york, united states, in June 2015. The 33 revised complete papers integrated during this quantity and awarded including 2 abstracts of invited talks, have been conscientiously reviewed and chosen from 157 submissions. they're prepared in topical sections on safe computation: primitives and new types; public key cryptographic primitives; safe computation II: purposes; anonymity and comparable purposes; cryptanalysis and assaults (symmetric crypto); privateness and coverage enforcement; authentication through eye monitoring and proofs of proximity; malware research and aspect channel assaults; aspect channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.

Show description

Read or Download Applied Cryptography and Network Security: 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers PDF

Similar applied books

The Scientific Papers of Sir Geoffrey Ingram Taylor (Aerodynamics and the Mechanics of Projectiles and Explosions)

Sir Geoffrey Ingram Taylor (1886-1975) used to be a physicist, mathematician and specialist on fluid dynamics and wave idea. he's broadly thought of to be one of many maximum actual scientists of the 20th century. throughout those 4 volumes, released among the years 1958 and 1971, Batchelor has accrued jointly virtually two hundred of Sir Geoffrey Ingram Taylor's papers.

Elements of Applied Bifurcation Theory

It is a booklet on nonlinear dynamical structures and their bifurcations lower than parameter version. It offers a reader with an effective foundation in dynamical platforms concept, in addition to specific systems for program of normal mathematical effects to specific difficulties. certain realization is given to effective numerical implementations of the constructed suggestions.

Additional info for Applied Cryptography and Network Security: 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers

Example text

This is accomplished with hyper-invertible matrices to ensure robustness. The protocol Reco opens a batch of secrets by sending each share to whichever party is supposed to learn the secret. That party then performs error detection/correction to interpolate the secrets in the presence of (possibly) corrupt shares. The protocol RanDouSha from [15] is also used as a subprotocol in our redistribution protocol. The protocol RanDouSha generates random sharings of degree d and additional sharings of the same secrets using degree 2d polynomials with constant amortized communication bandwidth.

5 (while some of the subprotocols are deferred to the full version of this paper [4]). In Sect. 6 we describe how the threshold may be raised in the statistical security setting. We show how our DPSS scheme can be applied to secure multiparty computation in Sect. 7. Security definitions and proofs are given in the full version of this paper [4]. 2 Related Work The same work [28] introducing the proactive security model also contained the first proactive secret sharing (PSS) scheme and proactively-secure multiparty computation (PMPC) protocol.

Then the Q and the Rj are generated simultaneously so that each party in the old group only learns her share of Q + Rj for each j. This technique preserves security but would not yield the optimal communication bandwidth that we aim for. Generating one polynomial for each party in the new group would result in a communication complexity of at least O(n2 ) for masking O(n) secrets while our goal is O(1) (amortized) communication per secret. In this paper we provide a solution that generates the polynomials Q without revealing any share of Q to the parties in the old group, and maintains optimal communication efficiency.

Download PDF sample

Rated 4.86 of 5 – based on 36 votes