Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56620-7_13
Brandon Broadnax, Nico Döttling, G. Hartung, J. Müller-Quade, Matthias Nagel
{"title":"Concurrently Composable Security with Shielded Super-Polynomial Simulators","authors":"Brandon Broadnax, Nico Döttling, G. Hartung, J. Müller-Quade, Matthias Nagel","doi":"10.1007/978-3-319-56620-7_13","DOIUrl":"https://doi.org/10.1007/978-3-319-56620-7_13","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117182055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56620-7_18
Payman Mohassel, Mike Rosulek, Alessandra Scafuro
{"title":"Sublinear Zero-Knowledge Arguments for RAM Programs","authors":"Payman Mohassel, Mike Rosulek, Alessandra Scafuro","doi":"10.1007/978-3-319-56620-7_18","DOIUrl":"https://doi.org/10.1007/978-3-319-56620-7_18","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125550372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56617-7_14
X. Wang, A. Malozemoff, Jonathan Katz
{"title":"Faster Secure Two-Party Computation in the Single-Execution Setting","authors":"X. Wang, A. Malozemoff, Jonathan Katz","doi":"10.1007/978-3-319-56617-7_14","DOIUrl":"https://doi.org/10.1007/978-3-319-56617-7_14","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122457967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56620-7_14
S. Badrinarayanan, Dakshita Khurana, R. Ostrovsky, Ivan Visconti
{"title":"Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs","authors":"S. Badrinarayanan, Dakshita Khurana, R. Ostrovsky, Ivan Visconti","doi":"10.1007/978-3-319-56620-7_14","DOIUrl":"https://doi.org/10.1007/978-3-319-56620-7_14","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114086766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56614-6_16
Y. Dodis, Siyao Guo, Jonathan Katz
{"title":"Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited","authors":"Y. Dodis, Siyao Guo, Jonathan Katz","doi":"10.1007/978-3-319-56614-6_16","DOIUrl":"https://doi.org/10.1007/978-3-319-56614-6_16","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126122301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56620-7_4
P. Ananth, Aayush Jain, A. Sahai
{"title":"Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption","authors":"P. Ananth, Aayush Jain, A. Sahai","doi":"10.1007/978-3-319-56620-7_4","DOIUrl":"https://doi.org/10.1007/978-3-319-56620-7_4","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126678507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56620-7_2
Jens-Dietrich Bauch, D. Bernstein, Henry de Valence, T. Lange, C. V. Vredendaal
{"title":"Short Generators Without Quantum Computers: The Case of Multiquadratics","authors":"Jens-Dietrich Bauch, D. Bernstein, Henry de Valence, T. Lange, C. V. Vredendaal","doi":"10.1007/978-3-319-56620-7_2","DOIUrl":"https://doi.org/10.1007/978-3-319-56620-7_2","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116545065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56620-7_1
P. Kirchner, Pierre-Alain Fouque
{"title":"Revisiting Lattice Attacks on Overstretched NTRU Parameters","authors":"P. Kirchner, Pierre-Alain Fouque","doi":"10.1007/978-3-319-56620-7_1","DOIUrl":"https://doi.org/10.1007/978-3-319-56620-7_1","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133350805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56617-7_4
S. Kamara, Tarik Moataz
{"title":"Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity","authors":"S. Kamara, Tarik Moataz","doi":"10.1007/978-3-319-56617-7_4","DOIUrl":"https://doi.org/10.1007/978-3-319-56617-7_4","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115616471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56620-7_21
Michel Abdalla, Romain Gay, Mariana Raykova, H. Wee
{"title":"Multi-input Inner-Product Functional Encryption from Pairings","authors":"Michel Abdalla, Romain Gay, Mariana Raykova, H. Wee","doi":"10.1007/978-3-319-56620-7_21","DOIUrl":"https://doi.org/10.1007/978-3-319-56620-7_21","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131290410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}