دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [Part III] نویسندگان: Kobbi Nissim (editor), Brent R. Waters (editor) سری: Lecture Notes in Computer Science, 13044 ISBN (شابک) : 9783030904562, 3030904563 ناشر: Springer سال نشر: 2021 تعداد صفحات: [525] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 9 Mb
در صورت تبدیل فایل کتاب Theory of cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب نظریه رمزنگاری: نوزدهمین کنفرانس بین المللی، TCC 2021، رالی، NC، ایالات متحده، 8-11 نوامبر 2021، مجموعه مقالات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
مجموعه سه جلدی LNCS 13042، LNCS 13043 و LNCS 13044 مجموعه مقالات داوری نوزدهمین کنفرانس بین المللی تئوری رمزنگاری، TCC 2021، برگزار شده در رالی، NC، ایالات متحده، در نوامبر 2021 را تشکیل می دهد. مجموع مقالات ارائه شده در 66 مورد این مجموعه سه جلدی با دقت بررسی و از بین 161 مورد ارسالی انتخاب شد. آنها موضوعات مربوط به سیستم های اثبات، رمزگذاری مبتنی بر ویژگی و عملکردی، مبهم سازی، مدیریت کلید و ارتباطات ایمن را پوشش می دهند.
The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication.
Preface Organization Contents – Part III Covert Learning: How to Learn with an Untrusted Intermediary 1 Introduction 1.1 Our Contributions 1.2 Real World Applications 1.3 Related Work 2 Covert Learning 2.1 Preliminaries 2.2 Definition of Covert Learning 2.3 A Warm-Up: Covert Learning of Noisy Parity Functions 2.4 Covert Learning of Low-Degree Fourier Coefficients 2.5 Covert Learning of Polynomial Size Decision Trees 3 Covert Verifiable Learning 3.1 Definition of Covert Verifiable Learning 3.2 Making CLF Verifiable 3.3 Making CLDT Verifiable 3.4 Verifiability Without Secret Examples References Random-Index PIR and Applications 1 Introduction 1.1 Random-Index PIR (RPIR) 1.2 Applications 1.3 Batch RPIR 1.4 Multi-server RPIR 1.5 Organization 2 Random-Index Private Information Retrieval 2.1 Background: Private Information Retrieval 2.2 Defining RPIR 2.3 Defining Multi-server RPIR 2.4 RPIR is equivalent to PIR 3 RPIR Protocols 3.1 Noninteractive RPIR 3.2 Multi-server RPIR Protocols 4 Applications to Large-Scale DoS-Resistant Computation 4.1 Target Anonymous Communication Channels from RPIR 5 Batch RPIR 5.1 Definitions 5.2 Constructions A Random-Index Oblivious-RAM A.1 Target Anonymous Channels from RORAM B Target Anonymous Channels from Mix-Nets References Forward Secret Encrypted RAM: Lower Bounds and Applications 1 Introduction 1.1 Our Main Result: Lower Bound 1.2 ``Bypassing'' the Lower Bound 2 Lower Bound Model 2.1 Framework for Symbolic Private Data Structure Lower Bounds 2.2 Symbolic Definitions for Allowed Primitives 2.3 FS eRAM Symbolic Definition 3 Forward Secret Encrypted RAM Lower Bound 3.1 Minimality and Usefulness 3.2 Key-Data Graph 3.3 Adversarial Strategy 4 Stronger Forward Secret Encrypted RAM Definitions 5 Oblivious Forward Secret Encrypted RAM 5.1 Definitions 5.2 Oblivious Forward Secret Encrypted RAM Construction 6 Forward Secret Memory Checkers 6.1 Forward Secret Memory Checker Definition 6.2 Forward Secret Memory Checker Construction References Laconic Private Set Intersection and Applications 1 Introduction 1.1 Our Results 1.2 Previous Work 1.3 Open Problems 2 Technical Overview 2.1 Semi-Honest PSI from CDH/LWE 2.2 Reusable Laconic PSI 2.3 DV-NIZK Range Proofs for DJ Ciphertexts 2.4 Labeled Laconic PSI and Laconic OT 3 Preliminaries 3.1 Hardness Assumptions 3.2 Laconic Private Set Intersection 4 Semi-Honest Laconic PSI from CDH/LWE 5 Reusable DV-NIZK Range Proofs for DJ Ciphertexts 5.1 Equality of Plaintexts in DJ and BGN Ciphertexts 5.2 DV-NIZK for Range Proofs of DJ Ciphertexts with Equal Discrete Log 6 Reusable Laconic Private Set Intersection 7 Self-Detecting Encryption References Amortizing Rate-1 OT and Applications to PIR and PSI 1 Introduction 1.1 Our Results 1.2 Applications 1.3 Comparison with Prior Work 2 Technical Overview 3 Preliminaries and Definitions 3.1 Amortized Rate-1 OT: Definition 4 Amortized Rate-1 OT from SXDH 4.1 Our Construction 4.2 Receiver Privacy 5 Amortized Rate-1 OT from Bilinear Power DDH 5.1 Receiver Privacy 6 Optimization 6.1 Delayed Pairing 6.2 Increasing Vector Dimension 7 Applications 7.1 Secure Function Evaluation on Branching Programs 7.2 PSI and PIR 7.3 Optimization for PSI and PSI-Cardinality 7.4 Other Variants of PSI and PIR 8 Amortized Rate-1 OT with Strong Sender Privacy References Ring-Based Identity Based Encryption – Asymptotically Shorter MPK and Tighter Security 1 Introduction 1.1 Our Contributions 1.2 Technical Overview 2 Preliminaries 2.1 Identity-Based Encryption (IBE) 2.2 Concrete Bit-Security 2.3 Lattices and Gaussian Distributions 2.4 Rings and Ideal Lattices 3 New Homomorphic Equality Test and Tighter Analysis 3.1 Homomorphic Equality Testing 3.2 Our Construction 3.3 An Optimization with Tighter Analysis 3.4 Application to Packing/Unpacking Homomorphic Encodings 4 New Partition Function and Homomorphic Evaluation 4.1 Our New Hash Function Family 4.2 Homomorphic Evaluation of the Partitioning Function 5 IBE Design and Analysis 5.1 Construction 5.2 Security 5.3 Asymptotic and Concrete Parameters References Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption 1 Introduction 2 Repliable Onion Encryption: Syntax and Correctness 2.1 Onion Evolutions, Forward Paths, Return Paths and Layerings 3 FROES: Onion Routing in the SUC Framework 3.1 Ideal Functionality FROES 3.2 SUC-realizability of FROES 4 Repliable-Onion Security: A Game-Based Definition 5 Repliable-Onion Security SUC-Realizability of FROES 6 Shallot Encryption 7 Shallot Encryption Scheme Is Secure A Security Game for Variants (b) and (c) References Grafting Key Trees: Efficient Key Management for Overlapping Groups 1 Introduction 1.1 The Asymptotic Setting 1.2 The Non-asymptotic Setting 1.3 Related Work 2 Preliminaries 2.1 Notation 2.2 Huffman Codes 3 Key-Derivation Graphs for Multiple Groups 3.1 Continuous Group-Key Agreement and Multicast Encryption 3.2 Key-Derivation Graphs 3.3 Security 3.4 The Trivial Algorithm 4 Key-Derivation Graphs in the Asymptotic Setting 4.1 Key-Derivation Graphs in the Asymptotic Setting 4.2 Update Cost for Concrete Group Systems 5 A Greedy Algorithm Based on Huffman Codes 5.1 Algorithm Description 5.2 Total Update Cost 5.3 Asymptotic Optimality of Boolean-Lattice Based Graphs 6 Lower Bound on the Update Cost of CGKA 6.1 Symbolic Model 6.2 Lower Bound on the Average Update Cost 7 Open Problems 7.1 Optimal Key-Derivation Graphs 7.2 Security 7.3 Efficiency of Dynamic Operations References Updatable Public Key Encryption in the Standard Model 1 Introduction 1.1 Our Technique: Using Circular Security and Leakage-Resilience 1.2 Additional Theoretical Contributions 1.3 Related Work 2 Preliminaries 3 Updatable Public Key Encryption (UPKE) 3.1 IND-CR-CPA Security of UPKE 4 Key-Dependent-Message-Secure Encryption Scheme 5 DDH Based Construction 5.1 The BHHO Cryptosystem 5.2 CS+LR Security of BHHO Cryptosystem 5.3 UPKE Construction 5.4 Security of the UPKE Construction 6 Constructions Based on LWE 6.1 The Dual Regev or GPV Cryptosystem 6.2 CS+LR Security of the Dual-Regev Cryptosystem 6.3 UPKE Construction 6.4 Security of the UPKE Construction 7 Towards Stronger Security References Towards Tight Adaptive Security of Non-interactive Key Exchange 1 Introduction 1.1 Technical Overview 2 Preliminaries 2.1 Pairing Group Assumptions 2.2 Non-Interactive Key Exchange 3 An Inner-Product-Based NIKE Scheme 4 Lower Bound 4.1 Lower Bound for Inner-product NIKEs References On the Impossibility of Purely Algebraic Signatures 1 Introduction 1.1 Related Work 1.2 Technical Outline 2 Preliminaries 2.1 Notation 2.2 Generic Group Model 2.3 Signatures 3 Signature Schemes over Groups of Prime Order 3.1 Algebraic Signatures 3.2 Preparation 3.3 Impossibility of Secure Algebraic Signatures 4 Signature Schemes over Groups of Unknown Order 4.1 Simplified Algebraic Signatures 4.2 Hermite Normal Form 4.3 An Inefficient AddColumn Procedure for Matrices in HNF 4.4 Impossibility of Simplified Algebraic Signatures 5 Extension: BLS Signatures Instantiated with Algebraic Hash Functions Are Insecure References Policy-Compliant Signatures 1 Introduction 1.1 Applications of PCS 1.2 Our Contributions and Organization of this Paper 1.3 Related Work 2 Preliminaries 3 Policy-Compliant Signatures 3.1 Adversarial Capabilities in the Security Games 3.2 Existential Unforgeability 3.3 Indistinguishability-Based Attribute Hiding 4 Construction of a Policy-Compliant Signature Scheme 4.1 The Scheme 4.2 Correctness 4.3 Existential Unforgeability 4.4 Indistinguishability-Based Attribute Hiding 4.5 Efficient Instantiations Based on Inner-Product PE 5 Universal Composability and SIM-Based PCS 5.1 Simulation-Based Attribute Hiding 5.2 On the SIM-Based Security of our Generic Scheme References Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions 1 Introduction 1.1 Our Contributions 1.2 Additional Related Work and Open Problems 1.3 Technical Overview 1.4 Paper Organization 2 Preliminaries 3 Succinct Proofs of Correct Exponentiation 3.1 The Basic Definition 3.2 Batch Proofs of Correct Exponentiation 4 Warm-Up: The Random Subset Compiler 5 Amplifying Soundness and Reducing Communication 6 An Improved Compiler from the Low Order Assumption 6.1 The Compiler 6.2 Soundness Analysis Based on the Low Order Assumption References Non-malleable Vector Commitments via Local Equivocability 1 Introduction 1.1 Our Contributions 1.2 Applications 1.3 Overview of Our Approach 1.4 Open Problems 1.5 Paper Organization 2 Preliminaries 2.1 Equivocable Commitment Schemes 2.2 Vector Commitment Schemes 2.3 One-Time Strongly-Unforgeable Signature Schemes 2.4 Universal One-Way Hash Functions 3 Non-malleable Vector Commitments 3.1 Existing Schemes Do Not Satisfy Our Notion 3.2 Simple Attempts that Fail 4 Locally-Equivocable Commitments with All-But-One Binding 5 Our Construction of a Non-malleable Vector Commitment Scheme References Non-malleable Time-Lock Puzzles and Applications 1 Introduction 1.1 Our Results 1.2 Related Work 1.3 Concurrent Work 1.4 Paper Organization 2 Technical Overview 2.1 Non-malleability for Time-Lock Puzzles 2.2 Publicly Verifiable Time-Lock Puzzles 2.3 Fair Multi-party Protocols 3 Preliminaries 4 Non-malleable Time-Lock Puzzles 4.1 Non-malleable Time-Lock Puzzle Construction 5 Applications to Multi-party Coin Flipping and Auctions A Discussion of Non-malleable Definitions References Vector and Functional Commitments from Lattices 1 Introduction 1.1 Our Contributions 1.2 Comparisons to Related Work 1.3 Technical Overview 1.4 Open Problems and Future Work 2 Preliminaries 2.1 Vector Commitments 2.2 Short Integer Solution and (Tagged) Trapdoors 3 Vector Commitments 3.1 Construction 3.2 Correctness 3.3 Security 3.4 Specialized Tree Transformation 4 Functional Commitments (with Authority) 4.1 Definitions 4.2 Homomorphic Commitments 4.3 Functional Commitment Construction References Author Index