Skip to main content
  • Conference proceedings
  • Open Access
  • © 2016

Advances in Cryptology – CRYPTO 2016

36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9816)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CRYPTO: Annual International Cryptology Conference

Conference proceedings info: CRYPTO 2016.

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-662-53015-3
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 109.99
Price excludes VAT (USA)

Table of contents (22 papers)

  1. Front Matter

    Pages I-XIII
  2. Quantum Techniques

    1. Front Matter

      Pages 1-1
    2. Quantum Homomorphic Encryption for Polynomial-Sized Circuits

      • Yfke Dulek, Christian Schaffner, Florian Speelman
      Pages 3-32
    3. Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications

      • Frédéric Dupuis, Serge Fehr, Philippe Lamontagne, Louis Salvail
      Pages 33-59
    4. Semantic Security and Indistinguishability in the Quantum World

      • Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner
      Pages 60-89
  3. Spooky Encryption

    1. Front Matter

      Pages 91-91
    2. Spooky Encryption and Its Applications

      • Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs
      Pages 93-122
  4. Secure Computation and Protocols II

    1. Front Matter

      Pages 147-147
    2. Adaptively Secure Garbled Circuits from One-Way Functions

      • Brett Hemenway, Zahra Jafargholi, Rafail Ostrovsky, Alessandra Scafuro, Daniel Wichs
      Pages 149-178
    3. Rate-1, Linear Time and Additively Homomorphic UC Commitments

      • Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Jesper Buus Nielsen
      Pages 179-207
    4. UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens

      • Jan Camenisch, Maria Dubovitskaya, Alfredo Rial
      Pages 208-239
    5. Probabilistic Termination and Composability of Cryptographic Protocols

      • Ran Cohen, Sandro Coretti, Juan Garay, Vassilis Zikas
      Pages 240-269
    6. Concurrent Non-Malleable Commitments (and More) in 3 Rounds

      • Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
      Pages 270-299
  5. IBE, ABE, and Functional Encryption

    1. Front Matter

      Pages 301-301
    2. Fully Secure Functional Encryption for Inner Products, from Standard Assumptions

      • Shweta Agrawal, Benoît Libert, Damien Stehlé
      Pages 333-362
    3. Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security

      • Zvika Brakerski, Vinod Vaikuntanathan
      Pages 363-384
  6. Automated Tools and Synthesis

    1. Front Matter

      Pages 385-385

About this book

The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016.

The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.

Keywords

  • formal methods
  • implementation security
  • public key techniques
  • symmetric cryptography
  • theory of security
  • authenticated encryption
  • cryptanalysis and other attacks
  • cryptography
  • deployment security
  • hash functions
  • homomorphic encryption
  • integer programming
  • lightweight cryptography
  • mathematical foundations of cryptography
  • needles in haystacks
  • post-quantum cryptography
  • privacy-preserving protocols
  • secure computation
  • supersingular elliptic curves
  • zero-knowledge

Editors and Affiliations

  • Impinj, Inc. , Seattle, USA

    Matthew Robshaw

  • University of Maryland , College Park, USA

    Jonathan Katz

Bibliographic Information

  • Book Title: Advances in Cryptology – CRYPTO 2016

  • Book Subtitle: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III

  • Editors: Matthew Robshaw, Jonathan Katz

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-662-53015-3

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: International Association for Cryptologic Research 2016

  • License: CC BY

  • Softcover ISBN: 978-3-662-53014-6Published: 21 July 2016

  • eBook ISBN: 978-3-662-53015-3Published: 25 July 2016

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIII, 651

  • Number of Illustrations: 77 b/w illustrations

  • Topics: Cryptology, Data and Information Security, Algorithms, IT Operations, Discrete Mathematics in Computer Science

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-662-53015-3
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 109.99
Price excludes VAT (USA)