×

zbMATH — the first resource for mathematics

Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. (English) Zbl 1270.94006
Lecture Notes in Computer Science 8043. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). xvii, 556 p. (2013).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1246.94010]. For Part I of the proceedings of the present conference see [Zbl 1270.94007].
Indexed articles:
Lindell, Yehuda, Fast cut-and-choose based protocols for malicious and covert adversaries, 1-17 [Zbl 1316.94082]
Huang, Yan; Katz, Jonathan; Evans, David, Efficient secure two-party computation using symmetric cut-and-choose, 18-35 [Zbl 1316.94078]
Mohassel, Payman; Riva, Ben, Garbled circuits checking garbled circuits: more efficient and secure two-party computation, 36-53 [Zbl 1300.68028]
Kolesnikov, Vladimir; Kumaresan, Ranjit, Improved OT extension for transferring short secrets, 54-70 [Zbl 1316.94080]
Thaler, Justin, Time-optimal interactive proofs for circuit evaluation, 71-89 [Zbl 1316.94093]
Ben-Sasson, Eli; Chiesa, Alessandro; Genkin, Daniel; Tromer, Eran; Virza, Madars, Snarks for C: verifying program executions succinctly and in zero knowledge, 90-108 [Zbl 1317.68050]
Göloğlu, Faruk; Granger, Robert; McGuire, Gary; Zumbrägel, Jens, On the function field sieve and the impact of higher splitting probabilities. Application to discrete logarithms in \(\mathbb{F}_{2^{1971}}\) and \(\mathbb{F}_{2^{3164}}\), 109-128 [Zbl 1316.11114]
Escala, Alex; Herold, Gottfried; Kiltz, Eike; Ràfols, Carla; Villar, Jorge, An algebraic framework for Diffie-Hellman assumptions, 129-147 [Zbl 1316.94070]
Fazio, Nelly; Gennaro, Rosario; Perera, Irippuge Milinda; Skeith, William E. III, Hard-core predicates for a Diffie-Hellman problem over finite fields, 148-165 [Zbl 1316.94071]
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent, Encoding functions with constant online rate or how to compress garbled circuits keys, 166-184 [Zbl 1298.94076]
Cohen, Gil; Damgård, Ivan Bjerre; Ishai, Yuval; Kölker, Jonas; Miltersen, Peter Bro; Raz, Ran; Rothblum, Ron D., Efficient multiparty protocols via log-depth threshold formulae. (Extended abstract), 185-202 [Zbl 1316.94066]
Hirt, Martin; Maurer, Ueli; Lucas, Christoph, A dynamic tradeoff between active and passive corruptions in secure multi-party computation, 203-219 [Zbl 1316.94077]
Goyal, Vipul; Gupta, Divya; Jain, Abhishek, What information is leaked under concurrent composition?, 220-238 [Zbl 1316.94075]
Dziembowski, Stefan; Kazana, Tomasz; Obremski, Maciej, Non-malleable codes from two-source extractors, 239-257 [Zbl 1316.94068]
Franklin, Matthew; Gelles, Ran; Ostrovsky, Rafail; Schulman, Leonard J., Optimal coding for streaming authentication and interactive communication, 258-276 [Zbl 1316.94073]
Martín, Sebastià; Padró, Carles; Yang, An, Secret sharing, rank inequalities and information inequalities, 277-288 [Zbl 1316.94103]
Libert, Benoît; Peters, Thomas; Joye, Marc; Yung, Moti, Linearly homomorphic structure-preserving signatures and their applications, 289-307 [Zbl 1296.94154]
Lyubashevsky, Vadim; Masny, Daniel, Man-in-the-middle secure authentication schemes from LPN and weak PRFs, 308-325 [Zbl 1316.94102]
Dupuis, Frédéric; Fawzi, Omar; Wehner, Stephanie, Achieving the limits of the noisy-storage model using entanglement sampling, 326-343 [Zbl 1317.81077]
Broadbent, Anne; Gutoski, Gus; Stebila, Douglas, Quantum one-time programs. (Extended abstract), 344-360 [Zbl 1317.81075]
Boneh, Dan; Zhandry, Mark, Secure signatures and chosen ciphertext security in a quantum computing world, 361-379 [Zbl 1317.81074]
Unruh, Dominique, Everlasting multi-party computation, 380-397 [Zbl 1317.81068]
Bellare, Mihir; Hoang, Viet Tung; Keelveedhi, Sriram, Instantiating random oracles via UCEs, 398-415 [Zbl 1316.94060]
Brakerski, Zvika; Rothblum, Guy N., Obfuscating conjunctions, 416-434 [Zbl 1309.94137]
Chen, Jie; Wee, Hoeteck, Fully, (almost) tightly secure IBE and dual system groups, 435-460 [Zbl 1311.94072]
Boneh, Dan; Raghunathan, Ananth; Segev, Gil, Function-private identity-based encryption: hiding the function in functional encryption, 461-478 [Zbl 1311.94071]
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent, Attribute-based encryption for circuits from multilinear maps, 479-499 [Zbl 1311.94080]
Agrawal, Shweta; Gorbunov, Sergey; Vaikuntanathan, Vinod; Wee, Hoeteck, Functional encryption: new perspectives and lower bounds, 500-518 [Zbl 1311.94065]
De Caro, Angelo; Iovino, Vincenzo; Jain, Abhishek; O’Neill, Adam; Paneth, Omer; Persiano, Giuseppe, On the achievability of simulation-based security for functional encryption, 519-535 [Zbl 1311.94077]
Goldwasser, Shafi; Kalai, Yael Tauman; Popa, Raluca Ada; Vaikuntanathan, Vinod; Zeldovich, Nickolai, How to run Turing machines on encrypted data, 536-553 [Zbl 1311.94082]

MSC:
94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest
PDF BibTeX XML Cite
Full Text: DOI