Skip to main content
  • Conference proceedings
  • © 2020

Public-Key Cryptography – PKC 2020

23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12111)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): PKC: IACR International Conference on Public-Key Cryptography

Conference proceedings info: PKC 2020.

Buying options

eBook USD 109.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-45388-6
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 139.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (22 papers)

  1. Front Matter

    Pages i-xix
  2. Lattice-Based Cryptography

    1. Front Matter

      Pages 1-1
    2. The Randomized Slicer for CVPP: Sharper, Faster, Smaller, Batchier

      • Léo Ducas, Thijs Laarhoven, Wessel P. J. van Woerden
      Pages 3-36
    3. Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes

      • Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang
      Pages 37-65
    4. MPSign: A Signature from Small-Secret Middle-Product Learning with Errors

      • Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé et al.
      Pages 66-93
  3. Proofs and Arguments II

    1. Front Matter

      Pages 95-95
    2. Boosting Verifiable Computation on Encrypted Data

      • Dario Fiore, Anca Nitulescu, David Pointcheval
      Pages 124-154
  4. Isogeny-Based Cryptography

    1. Front Matter

      Pages 155-155
    2. Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512

      • Ali El Kaafarani, Shuichi Katsumata, Federico Pintore
      Pages 157-186
    3. Threshold Schemes from Isogeny Assumptions

      • Luca De Feo, Michael Meyer
      Pages 187-212
  5. Multiparty Protocols

    1. Front Matter

      Pages 213-213
    2. Topology-Hiding Computation for Networks with Unknown Delays

      • Rio LaVigne, Chen-Da Liu-Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi
      Pages 215-245
    3. Sublinear-Round Byzantine Agreement Under Corrupt Majority

      • T.-H. Hubert Chan, Rafael Pass, Elaine Shi
      Pages 246-265
    4. Bandwidth-Efficient Threshold EC-DSA

      • Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
      Pages 266-296
  6. Secure Computation and Related Primitives

    1. Front Matter

      Pages 297-297
    2. Blazing Fast OT for Three-Round UC OT Extension

      • Ran Canetti, Pratik Sarkar, Xiao Wang
      Pages 299-327
    3. Going Beyond Dual Execution: MPC for Functions with Efficient Verification

      • Carmit Hazay, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam
      Pages 328-356
    4. Mon \(\mathbb {Z}_{2^{k}}\) a: Fast Maliciously Secure Two Party Computation on \(\mathbb {Z}_{2^{k}}\)

      • Dario Catalano, Mario Di Raimondo, Dario Fiore, Irene Giacomelli
      Pages 357-386
  7. Post-Quantum Primitives

    1. Front Matter

      Pages 387-387

Other Volumes

  1. Public-Key Cryptography – PKC 2020

    23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I
  2. Public-Key Cryptography – PKC 2020

    23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II

About this book

The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020.

The 44 full papers presented were carefully reviewed and selected from 180 submissions. They are organized in topical sections such as: functional encryption; identity-based encryption; obfuscation and applications; encryption schemes; secure channels; basic primitives with special properties; proofs and arguments; lattice-based cryptography; isogeny-based cryptography; multiparty protocols; secure computation and related primitives; post-quantum primitives; and privacy-preserving schemes.

Keywords

  • access control
  • authentication
  • communication
  • computer networks
  • computer security
  • computer systems
  • cryptography
  • data security
  • digital signature
  • electronic document identification systems
  • engineering
  • internet
  • network protocols
  • network security
  • privacy
  • public key cryptography
  • signal processing
  • telecommunication systems
  • the standard model

Editors and Affiliations

  • University of Edinburgh, Edinburgh, UK

    Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas

Bibliographic Information

Buying options

eBook USD 109.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-45388-6
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 139.99
Price excludes VAT (USA)