Advertisement

Advances in Cryptology – CRYPTO 2018

38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III

  • Hovav Shacham
  • Alexandra Boldyreva

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10993)

Also part of the Security and Cryptology book sub series (LNSC, volume 10993)

Table of contents

  1. Front Matter
    Pages I-XV
  2. Efficient MPC

    1. Front Matter
      Pages 1-1
    2. Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
      Pages 3-33
    3. Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell et al.
      Pages 34-64
  3. Quantum Cryptography

    1. Front Matter
      Pages 65-65
    2. Zvika Brakerski
      Pages 67-95
    3. Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma
      Pages 96-125
    4. Zhengfeng Ji, Yi-Kai Liu, Fang Song
      Pages 126-152
    5. Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee
      Pages 184-210
  4. MPC

    1. Front Matter
      Pages 211-211
    2. Elette Boyle, Ran Cohen, Deepesh Data, Pavel Hubáček
      Pages 243-272
    3. Sanjam Garg, Peihan Miao, Akshayaram Srinivasan
      Pages 273-301
    4. Elette Boyle, Yuval Ishai, Antigoni Polychroniadou
      Pages 302-332
  5. Garbling

    1. Front Matter
      Pages 333-333
    2. Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ameer Mohammed
      Pages 335-364
    3. Jonathan Katz, Samuel Ranellucci, Mike Rosulek, Xiao Wang
      Pages 365-391
  6. Information-Theoretic MPC

    1. Front Matter
      Pages 393-393
    2. Ignacio Cascudo, Ronald Cramer, Chaoping Xing, Chen Yuan
      Pages 395-426
    3. Prabhanjan Ananth, Yuval Ishai, Amit Sahai
      Pages 427-455
  7. Various Topics

    1. Front Matter
      Pages 457-457
    2. Divesh Aggarwal, Antoine Joux, Anupam Prakash, Miklos Santha
      Pages 459-482
    3. Florian Bourse, Michele Minelli, Matthias Minihold, Pascal Paillier
      Pages 483-512
  8. Oblivious Transfer

    1. Front Matter
      Pages 513-513
    2. Sanjam Garg, Rafail Ostrovsky, Akshayaram Srinivasan
      Pages 515-544
    3. Sanjam Garg, Mohammad Mahmoody, Daniel Masny, Izaak Meckler
      Pages 545-574
  9. Non-malleable Codes

    1. Front Matter
      Pages 575-575
    2. Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
      Pages 577-607
    3. Rafail Ostrovsky, Giuseppe Persiano, Daniele Venturi, Ivan Visconti
      Pages 608-639
  10. Zero Knowledge

    1. Front Matter
      Pages 641-641
    2. Shashank Agrawal, Chaya Ganesh, Payman Mohassel
      Pages 643-673
    3. Itay Berman, Akshay Degwekar, Ron D. Rothblum, Prashant Nalini Vasudevan
      Pages 674-697
    4. Jens Groth, Markulf Kohlweiss, Mary Maller, Sarah Meiklejohn, Ian Miers
      Pages 698-728
  11. Obfuscation

    1. Front Matter
      Pages 729-729
    2. Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi
      Pages 731-752
    3. Gilad Asharov, Naomi Ephraim, Ilan Komargodski, Rafael Pass
      Pages 753-783
  12. Back Matter
    Pages 785-787

Other volumes

  1. 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I
  2. 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II
  3. Advances in Cryptology – CRYPTO 2018
    38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III

About these proceedings

Introduction

The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018.
The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.

Keywords

cryptography key management public key (asymmetric) techniques digital signatures public key encryption symmetric cryptography and hash functions block and stream ciphers cryptanalysis and other attacks information-theoretic techniques mathematical foundations of cryptography computer science authentication public key cryptography cryptography encryption communication privacy preserving software engineering public-key encryption homomorphic encryption

Editors and affiliations

  • Hovav Shacham
    • 1
  • Alexandra Boldyreva
    • 2
  1. 1.The University of Texas at AustinAustinUSA
  2. 2.Georgia Institute of TechnologyAtlantaUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-96878-0
  • Copyright Information International Association for Cryptologic Research 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-96877-3
  • Online ISBN 978-3-319-96878-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site