Advances in Cryptology -- CRYPTO 2015

35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II

  • Rosario Gennaro
  • Matthew Robshaw
Conference proceedings CRYPTO 2015

DOI: 10.1007/978-3-662-48000-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9216)

Table of contents

  1. Front Matter
    Pages I-XVIII
  2. Multiparty Computation I

    1. Front Matter
      Pages 1-1
    2. Vipul Goyal, Divya Gupta, Amit Sahai
      Pages 23-42
    3. Ran Canetti, Vipul Goyal, Abhishek Jain
      Pages 43-62
    4. S. Dov Gordon, Feng-Hao Liu, Elaine Shi
      Pages 63-82
  3. Zero-Knowledge

    1. Front Matter
      Pages 83-83
    2. Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee
      Pages 107-129
    3. Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
      Pages 130-149
    4. Zhangxiang Hu, Payman Mohassel, Mike Rosulek
      Pages 150-169
  4. Theory

    1. Front Matter
      Pages 171-171
    2. Iftach Haitner, Yuval Ishai, Eran Omri, Ronen Shaltiel
      Pages 173-190
    3. Sanjam Garg, Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
      Pages 191-208
  5. Signatures

    1. Front Matter
      Pages 231-231
    2. Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
      Pages 233-253
    3. Eike Kiltz, Jiaxin Pan, Hoeteck Wee
      Pages 275-295

Other volumes

  1. 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I
  2. Advances in Cryptology -- CRYPTO 2015
    35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II

About these proceedings

Introduction

The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015. The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic insights; modes and constructions; multilinear maps and IO; pseudorandomness; block cipher cryptanalysis; integrity; assumptions; hash functions and stream cipher cryptanalysis; implementations; multiparty computation; zero-knowledge; theory; signatures; non-signaling and information-theoretic crypto; attribute-based encryption; new primitives; and fully homomorphic/functional encryption.

Keywords

Adaptive security Asymmetric cryptography Biometric authentication Cascade encryption Cryptanalysis Cryptography Deterministic encryption Formal methods Functional encryption Hash functions Information theory Mathematical foundations of cryptography Multi-party computation Privacy Public key cryptography Secure computation Stream ciphers Symmetric cryptography Theory of security Zero knowledge

Editors and affiliations

  • Rosario Gennaro
    • 1
  • Matthew Robshaw
    • 2
  1. 1.City College of New YorkNew YorkUSA
  2. 2.Impinj, Inc.SeattleUSA

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-47999-5
  • Online ISBN 978-3-662-48000-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349