Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III [1st ed.] 9783030648398, 9783030648404

The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conferen

290 61 23MB

English Pages XV, 904 [912] Year 2020

Report DMCA / Copyright

DOWNLOAD FILE

Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III [1st ed.]
 9783030648398, 9783030648404

Table of contents :
Front Matter ....Pages i-xv
Front Matter ....Pages 1-1
\(\mathtt {MOTIF}\): (Almost) Free Branching in GMW (David Heath, Vladimir Kolesnikov, Stanislav Peceny)....Pages 3-30
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning (Hao Chen, Miran Kim, Ilya Razenshteyn, Dragos Rotaru, Yongsoo Song, Sameer Wagh)....Pages 31-59
On the Exact Round Complexity of Best-of-Both-Worlds Multi-party Computation (Arpita Patra, Divya Ravi, Swati Singla)....Pages 60-91
MPC with Synchronous Security and Asynchronous Responsiveness (Chen-Da Liu-Zhang, Julian Loss, Ueli Maurer, Tal Moran, Daniel Tschudi)....Pages 92-119
Secure MPC: Laziness Leads to GOD (Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai)....Pages 120-150
Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over \(\mathbb {Z}/p^k\mathbb {Z} \) (Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Matthieu Rambaud, Chaoping Xing et al.)....Pages 151-180
Towards Efficiency-Preserving Round Compression in MPC (Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain)....Pages 181-212
Circuit Amortization Friendly Encodingsand Their Application to Statistically Secure Multiparty Computation (Anders Dalskov, Eysa Lee, Eduardo Soria-Vazquez)....Pages 213-243
Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs (Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof)....Pages 244-276
Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security (Ran Canetti, Pratik Sarkar, Xiao Wang)....Pages 277-308
Front Matter ....Pages 309-309
ALBATROSS: Publicly AttestabLe BATched Randomness Based On Secret Sharing (Ignacio Cascudo, Bernardo David)....Pages 311-341
Secret-Shared Shuffle (Melissa Chase, Esha Ghosh, Oxana Poburinnaya)....Pages 342-372
Front Matter ....Pages 373-373
Adaptively Secure Inner Product Encryption from LWE (Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa)....Pages 375-404
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions (Nuttapong Attrapadung, Junichi Tomida)....Pages 405-436
Succinct and Adaptively Secure ABE for ABP from k-Lin (Huijia Lin, Ji Luo)....Pages 437-466
Inner-Product Functional Encryption with Fine-Grained Access Control (Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu)....Pages 467-497
MoniPoly—An Expressive q-SDH-Based Anonymous Attribute-Based Credential System (Syh-Yuan Tan, Thomas Groß)....Pages 498-526
Front Matter ....Pages 527-527
The Direction of Updatable Encryption Does Not Matter Much (Yao Jiang)....Pages 529-558
Improving Speed and Security in Updatable Encryption Schemes (Dan Boneh, Saba Eskandarian, Sam Kim, Maurice Shih)....Pages 559-589
CCA Updatable Encryption Against Malicious Re-encryption Attacks (Long Chen, Yanan Li, Qiang Tang)....Pages 590-620
Determining the Core Primitive for Optimally Secure Ratcheting (Fatih Balli, Paul Rösler, Serge Vaudenay)....Pages 621-650
Front Matter ....Pages 651-651
Cryptography from One-Way Communication: On Completeness of Finite Channels (Shweta Agrawal, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan, Manoj Prabhakaran, Vinod Prabhakaran et al.)....Pages 653-685
Succinct Functional Commitment for a Large Class of Arithmetic Circuits (Helger Lipmaa, Kateryna Pavlyk)....Pages 686-716
Crowd Verifiable Zero-Knowledge and End-to-End Verifiable Multiparty Computation (Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang)....Pages 717-748
Non-interactive Composition of Sigma-Protocols via Share-then-Hash (Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen)....Pages 749-773
Succinct Diophantine-Satisfiability Arguments (Patrick Towa, Damien Vergnaud)....Pages 774-804
Individual Simulations (Yi Deng)....Pages 805-836
Front Matter ....Pages 837-837
KVaC: Key-Value Commitments for Blockchains and Beyond (Shashank Agrawal, Srinivasan Raghuraman)....Pages 839-869
Catalic: Delegated PSI Cardinality with Applications to Contact Tracing (Thai Duong, Duong Hieu Phan, Ni Trieu)....Pages 870-899
Back Matter ....Pages 901-904

Polecaj historie