Advertisement

Advances in Cryptology – CRYPTO 2019

39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part II

  • Alexandra Boldyreva
  • Daniele Micciancio
Conference proceedings CRYPTO 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11693)

Also part of the Security and Cryptology book sub series (LNSC, volume 11693)

Table of contents

  1. Front Matter
    Pages i-xv
  2. MPC Communication Complexity

    1. Front Matter
      Pages 1-1
    2. Ran Cohen, Abhi Shelat, Daniel Wichs
      Pages 30-60
    3. Ivan Damgård, Kasper Green Larsen, Jesper Buus Nielsen
      Pages 61-84
    4. Vipul Goyal, Yanyi Liu, Yifan Song
      Pages 85-114
  3. Symmetric Cryptanalysis

    1. Front Matter
      Pages 115-115
    2. Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao
      Pages 117-149
    3. Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu
      Pages 180-209
    4. Gaëtan Leurent, Ferdinand Sibleyras
      Pages 210-235
  4. (Post) Quantum Cryptography

    1. Front Matter
      Pages 237-237
    2. Andris Ambainis, Mike Hamburg, Dominique Unruh
      Pages 269-295
    3. Jan Czajkowski, Andreas Hülsing, Christian Schaffner
      Pages 296-325
    4. Qipeng Liu, Mark Zhandry
      Pages 326-355
    5. Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
      Pages 356-383
  5. Leakage Resilience

    1. Front Matter
      Pages 385-385
    2. Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan
      Pages 387-416
    3. Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu
      Pages 417-447
    4. Akshayaram Srinivasan, Prashant Nalini Vasudevan
      Pages 480-509
    5. Divesh Aggarwal, Ivan Damgård, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto, João Ribeiro et al.
      Pages 510-539
  6. Memory Hard Functions and Privacy Amplification

    1. Front Matter
      Pages 541-541
    2. Binyi Chen, Stefano Tessaro
      Pages 543-572
    3. Jeremiah Blocki, Ben Harsha, Siteng Kang, Seunghoon Lee, Lu Xing, Samson Zhou
      Pages 573-607
    4. Vipul Goyal, Aayush Jain, Amit Sahai
      Pages 608-637
    5. Borja Balle, James Bell, Adrià Gascón, Kobbi Nissim
      Pages 638-667
  7. Attribute Based Encryption

    1. Front Matter
      Pages 669-669
    2. Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi
      Pages 701-731
    3. Junqing Gong, Brent Waters, Hoeteck Wee
      Pages 732-764
    4. Shweta Agrawal, Monosij Maitra, Shota Yamada
      Pages 765-797
  8. Foundations

    1. Front Matter
      Pages 799-799
    2. James Bartusek, Fermi Ma, Mark Zhandry
      Pages 801-830
    3. Rohit Agrawal, Yi-Hsiu Chen, Thibaut Horel, Salil Vadhan
      Pages 831-858
  9. Back Matter
    Pages 859-861

Other volumes

  1. 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part I
  2. Advances in Cryptology – CRYPTO 2019
    39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part II
  3. 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III

About these proceedings

Introduction

The three-volume set, LNCS 11692, LNCS 11693, and LNCS 11694, constitutes the refereed proceedings of the 39th Annual International Cryptology Conference, CRYPTO 2019, held in Santa Barbara, CA, USA, in August 2019.

The 81 revised full papers presented were carefully reviewed and selected from 378 submissions. The papers are organized in the following topical sections:

Part I: Award papers; lattice-based ZK; symmetric cryptography; mathematical cryptanalysis; proofs of storage; non-malleable codes; SNARKs and blockchains; homomorphic cryptography; leakage models and key reuse.

Part II: MPC communication complexity; symmetric cryptanalysis; (post) quantum cryptography; leakage resilience; memory hard functions and privacy amplification; attribute based encryption; foundations.

Part III: Trapdoor functions; zero knowledge I; signatures and messaging; obfuscation; watermarking; secure computation; various topics; zero knowledge II; key exchange and broadcast encryption.


Keywords

artificial intelligence authentication ciphertexts construction cryptography data mining data privacy electronic document identification systems encryption hash functions privacy preserving public key cryptography random oracle model security semantics software engineering structural design zero knowledge

Editors and affiliations

  • Alexandra Boldyreva
    • 1
  • Daniele Micciancio
    • 2
  1. 1.Georgia Institute of TechnologyAtlantaUSA
  2. 2.University of California at San DiegoLa JollaUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-26951-7
  • Copyright Information International Association for Cryptologic Research 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-030-26950-0
  • Online ISBN 978-3-030-26951-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site