Pub Date : 2016-08-31DOI: 10.1007/978-3-319-44618-9_22
Chris Peikert
{"title":"How (Not) to Instantiate Ring-LWE","authors":"Chris Peikert","doi":"10.1007/978-3-319-44618-9_22","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_22","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114968880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-31DOI: 10.1007/978-3-319-44618-9_28
S. Dolev, Karim M. El Defrawy, Joshua Lampkins, R. Ostrovsky, M. Yung
{"title":"Proactive Secret Sharing with a Dishonest Majority","authors":"S. Dolev, Karim M. El Defrawy, Joshua Lampkins, R. Ostrovsky, M. Yung","doi":"10.1007/978-3-319-44618-9_28","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_28","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"128 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129945349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-31DOI: 10.1007/978-3-319-44618-9_17
Carmit Hazay, Hila Zarosim
{"title":"The Feasibility of Outsourced Database Search in the Plain Model","authors":"Carmit Hazay, Hila Zarosim","doi":"10.1007/978-3-319-44618-9_17","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_17","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134354915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-31DOI: 10.1007/978-3-319-44618-9_18
D. Catalano, M. Raimondo, S. Faro
{"title":"Verifiable Pattern Matching on Outsourced Texts","authors":"D. Catalano, M. Raimondo, S. Faro","doi":"10.1007/978-3-319-44618-9_18","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_18","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116628432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-31DOI: 10.1007/978-3-319-44618-9_12
Esha Ghosh, M. Goodrich, O. Ohrimenko, R. Tamassia
{"title":"Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees","authors":"Esha Ghosh, M. Goodrich, O. Ohrimenko, R. Tamassia","doi":"10.1007/978-3-319-44618-9_12","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_12","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122546663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-31DOI: 10.1007/978-3-319-44618-9_7
Ran Cohen, Chris Peikert
{"title":"On Adaptively Secure Multiparty Computation with a Short CRS","authors":"Ran Cohen, Chris Peikert","doi":"10.1007/978-3-319-44618-9_7","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_7","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127778022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-31DOI: 10.1007/978-3-319-44618-9_30
Antonio Marcedone, R. Pass, Abhi Shelat
{"title":"Bounded KDM Security from iO and OWF","authors":"Antonio Marcedone, R. Pass, Abhi Shelat","doi":"10.1007/978-3-319-44618-9_30","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_30","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"418 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133971333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-31DOI: 10.1007/978-3-319-44618-9_5
A. Boldyreva, Taesoo Kim, R. Lipton, B. Warinschi
{"title":"Provably-Secure Remote Memory Attestation for Heap Overflow Protection","authors":"A. Boldyreva, Taesoo Kim, R. Lipton, B. Warinschi","doi":"10.1007/978-3-319-44618-9_5","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_5","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124239569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-31DOI: 10.1007/978-3-319-44618-9_10
Trotta Gnam
{"title":"Zero-Knowledge Made Easy so It Won't Make You Dizzy - (A Tale of Transaction Put in Verse About an Illicit Kind of Commerce)","authors":"Trotta Gnam","doi":"10.1007/978-3-319-44618-9_10","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_10","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127874516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-08-31DOI: 10.1007/978-3-319-44618-9_8
Ashish Choudhury, Emmanuela Orsini, A. Patra, N. Smart
{"title":"Linear Overhead Optimally-Resilient Robust MPC Using Preprocessing","authors":"Ashish Choudhury, Emmanuela Orsini, A. Patra, N. Smart","doi":"10.1007/978-3-319-44618-9_8","DOIUrl":"https://doi.org/10.1007/978-3-319-44618-9_8","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121182913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}