default search action
10th SCN 2016: Amalfi, Italy
- Vassilis Zikas, Roberto De Prisco:
Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings. Lecture Notes in Computer Science 9841, Springer 2016, ISBN 978-3-319-44617-2
Encryption
- Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au:
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups. 3-22 - Jie Chen, Benoît Libert, Somindu C. Ramanna:
Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys. 23-41 - Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada:
Attribute-Based Encryption for Range Attributes. 42-61 - Silvio Biagioni, Daniel Masny, Daniele Venturi:
Naor-Yung Paradigm with Shared Randomness and Applications. 62-80
Memory Protection
- Alexandra Boldyreva, Taesoo Kim, Richard J. Lipton, Bogdan Warinschi:
Provably-Secure Remote Memory Attestation for Heap Overflow Protection. 83-103 - Jan Camenisch, Robert R. Enderlein, Ueli Maurer:
Memory Erasability Amplification. 104-125
Multi-party Computation
- Ran Cohen, Chris Peikert:
On Adaptively Secure Multiparty Computation with a Short CRS. 129-146 - Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart:
Linear Overhead Optimally-Resilient Robust MPC Using Preprocessing. 147-168 - Brett Hemenway, Steve Lu, Rafail Ostrovsky, William Welser IV:
High-Precision Secure Computation of Satellite Collision Probabilities. 169-187
Zero-Knowledge Proofs
- Trotta Gnam:
Zero-Knowledge Made Easy so It Won't Make You Dizzy - (A Tale of Transaction Put in Verse About an Illicit Kind of Commerce). 191-197 - Arno Mittelbach, Daniele Venturi:
Fiat-Shamir for Highly Sound Protocols Is Instantiable. 198-215 - Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia:
Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees. 216-236 - Yi Deng, Juan A. Garay, San Ling, Huaxiong Wang, Moti Yung:
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs. 237-253
Efficient Protocols
- Eiichiro Fujisaki:
Improving Practical UC-Secure Commitments Based on the DDH Assumption. 257-272 - Rafaël del Pino, Vadim Lyubashevsky, David Pointcheval:
The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs. 273-291 - Leonid Reyzin, Sophia Yakoubov:
Efficient Asynchronous Accumulators for Distributed PKI. 292-309
Outsourcing Computation
- Carmit Hazay, Hila Zarosim:
The Feasibility of Outsourced Database Search in the Plain Model. 313-332 - Dario Catalano, Mario Di Raimondo, Simone Faro:
Verifiable Pattern Matching on Outsourced Texts. 333-350
Digital Signatures
- Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin:
Virtual Smart Cards: How to Sign with a Password and a Server. 353-371 - Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Signatures Resilient to Uninvertible Leakage. 372-390 - Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig:
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions. 391-408
Cryptanalysis
- Chris Peikert:
How (Not) to Instantiate Ring-LWE. 411-430 - Christof Beierle:
Pen and Paper Arguments for SIMON and SIMON-like Designs. 431-446
Two-party Computation
- Tatiana Bradley, Sky Faber, Gene Tsudik:
Bounded Size-Hiding Private Set Intersection. 449-467 - Carsten Baum:
On Garbling Schemes with and Without Privacy. 468-485 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
What Security Can We Achieve Within 4 Rounds? 486-505
Secret Sharing
- Amos Beimel, Oriol Farràs, Naty Peter:
Secret Sharing Schemes for Dense Forbidden Graphs. 509-528 - Shlomi Dolev, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky, Moti Yung:
Proactive Secret Sharing with a Dishonest Majority. 529-548
Obfuscation
- Zvika Brakerski, Or Dagmi:
Shorter Circuit Obfuscation in Challenging Security Models. 551-570 - Antonio Marcedone, Rafael Pass, Abhi Shelat:
Bounded KDM Security from iO and OWF. 571-586 - Matthew D. Green, Jonathan Katz, Alex J. Malozemoff, Hong-Sheng Zhou:
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation. 587-603
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.