Advances in Cryptology – EUROCRYPT 2021 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part III
The 3-volume-set LNCS 12696 – 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021. The 78 full papers included in these proceed...
Other Authors: | , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Cham
Springer International Publishing
2021, 2021
|
Edition: | 1st ed. 2021 |
Series: | Security and Cryptology
|
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- Garbled Circuits
- LogStack: Stacked Garbling with O(b log b) Computation
- Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits
- Threshold Garbled Circuits and Ad Hoc Secure Computation
- Indistinguishability Obfuscation
- Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification
- Candidate Obfuscation via Oblivious LWE Sampling
- Non-Malleable Commitments
- Black-Box Non-Interactive Non-Malleable Commitments
- Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments
- Zero-Knowledge Proofs
- Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers
- Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
- Towards Accountability in CRS Generation
- Property-Preserving Hash Functions and ORAM
- Robust Property-Preserving Hash Functions for Hamming Distance and More
- Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution
- Structured Encryption and Dynamic Leakage Suppression
- Blockchain
- Dynamic Ad Hoc Clock Synchronization
- TARDIS: A Foundation of Time-Lock Puzzles in UC
- Privacy and Law Enforcement
- On the power of multiple anonymous messages: Frequency Estimation and Selection in the Shuffle Model of Differential Privacy
- Non-Interactive Anonymous Router
- "Bifurcated Cryptography" Folding Competing Cryptosystems into a Single Scheme: On Accountability vs. Anonymity in Private Signatures
- Abuse Resistant Law Enforcement Access Systems.