CRYPTO 2010:
Tal Rabin (Ed.):
Advances in Cryptology - CRYPTO 2010 - CRYPTO 2010,
30th Annual Cryptology Conference,
Santa Barbara, CA, USA,
August 15-19, 2010
Proceedings.
CRYPTO 2010
Santa Barbara, CA, USA,
August 15-19, 2010
Organizational Committee
Program Chairs : | Tal Rabin | |
General Chair : | Zulfikar Ramzan |
Program Committee
Michel Abdalla |
Adi Akavia |
Amos Beimel |
Xavier Boyen |
Christian Cachin |
Serge Fehr |
Carmit Hazay |
Johan Håstad |
Susan Hohenberger |
Thomas Holenstein |
Yael Tauman Kalai |
John Kelsey |
Eike Kiltz |
Eyal Kushilevitz |
Tanja Lange |
Yehuda Lindell |
Ilya Mironov |
Tal Moran |
Jesper Buus Nielsen |
Eiji Okamoto |
Pascal Paillier |
Rafael Pass |
Giuseppe Persiano |
Thomas Peyrin |
Leonid Reyzin |
Matthew J. B. Robshaw |
Palash Sarkar |
Abhi Shelat |
Vinod Vaikuntanathan |
Brent Waters |
Hoeteck Wee |
Andrew Chi-Chih Yao |
External Referees
-
Leakage
-
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Back).
, 1-20,
Shafi Goldwasser
,
Zvika Brakerski
bib info -
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks.
, 21-40,
Krzysztof Pietrzak
,
Yevgeniy Dodis
bib info -
Protecting Cryptographic Keys against Continual Leakage.
, 41-58,
Yevgeniy Vahlis
,
Ali Juma
bib info -
Securing Computation against Continuous Leakage.
, 59-79,
Shafi Goldwasser
,
Guy N. Rothblum
bib info -
An Efficient and Parallel Gaussian Sampler for Lattices.
, 80-97,
Chris Peikert
bib info
-
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Back).
, 1-20,
Shafi Goldwasser
,
Zvika Brakerski
- Lattice
- Homomorphic Encryption
-
Theory and Applications
-
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography.
, 173-190,
Vipul Goyal
,
Amit Sahai
,
Yuval Ishai
,
Mohammad Mahmoody
bib info -
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.
, 191-208,
Tatsuaki Okamoto
,
Katsuyuki Takashima
bib info -
Structure-Preserving Signatures and Commitments to Group Elements.
, 209-236,
Masayuki Abe
,
Miyako Ohkubo
,
Jens Groth
,
Georg Fuchsbauer
,
Kristiyan Haralambiev
bib info -
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves.
, 237-254,
Jean-Sébastien Coron
,
Eric Brier
,
Thomas Icart
,
Mehdi Tibouchi
,
David Madore
,
Hugues Randriam
bib info
-
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography.
, 173-190,
Vipul Goyal
,
Amit Sahai
,
Yuval Ishai
,
Mohammad Mahmoody
-
Key Exchange, OAEP/RSA, CCA
-
Credential Authenticated Identification and Key Exchange.
, 255-276,
Jan Camenisch
,
Victor Shoup
,
Thomas Groß
,
Nathalie Casati
bib info -
Password-Authenticated Session-Key Generation on the Internet in the Plain Model.
, 277-294,
Rafail Ostrovsky
,
Vipul Goyal
,
Abhishek Jain 0002
bib info -
Instantiability of RSA-OAEP under Chosen-Plaintext Attack.
, 295-313,
Eike Kiltz
,
Adam Smith
,
Adam O'Neill
bib info -
Efficient Chosen-Ciphertext Security via Extractable Hash Proofs.
, 314-332,
Hoeteck Wee
bib info
-
Credential Authenticated Identification and Key Exchange.
, 255-276,
Jan Camenisch
,
Victor Shoup
,
Thomas Groß
,
Nathalie Casati
-
Attacks
- Factorization of a 768-Bit RSA Modulus. , 333-350, Arjen K. Lenstra , Peter L. Montgomery , Kazumaro Aoki , Paul Zimmermann , Pierrick Gaudry , Emmanuel Thomé , Jens Franke , Thorsten Kleinjung , Dag Arne Osvik , Joppe W. Bos , Alexander Kruppa , bib info
-
Correcting Errors in RSA Private Keys.
, 351-369,
Alexander May
,
Wilko Henecka
,
Alexander Meurer
bib info -
Improved Differential Attacks for ECHO and Grøstl.
, 370-392,
Thomas Peyrin
bib info -
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.
, 393-410,
Orr Dunkelman
,
Nathan Keller
,
Adi Shamir
bib info
-
Composition
-
Universally Composable Incoercibility.
, 411-428,
Dominique Unruh
,
Jörn Müller-Quade
bib info NULL -
Concurrent Non-Malleable Zero Knowledge Proofs.
, 429-446,
Rafael Pass
,
Wei-Lung Dustin Tseng
,
Muthuramakrishnan Venkitasubramaniam
,
Huijia Lin
bib info -
Equivalence of Uniform Key Agreement and Composition Insecurity.
, 447-464,
Rafail Ostrovsky
,
Chongwon Cho
,
Chen-Kuei Lee
bib info
-
Universally Composable Incoercibility.
, 411-428,
Dominique Unruh
,
Jörn Müller-Quade
-
Computation Delegation and Obfuscation
-
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
, 465-482,
Rosario Gennaro
,
Craig Gentry
,
Bryan Parno
bib info -
Improved Delegation of Computation Using Fully Homomorphic Encryption.
, 483-501,
Salil P. Vadhan
,
Yael Tauman Kalai
,
Kai-Min Chung
bib info -
Oblivious RAM Revisited.
, 502-519,
Benny Pinkas
,
Tzachy Reinman
bib info -
On Strong Simulation and Composable Point Obfuscation.
, 520-537,
Ran Canetti
,
Nir Bitansky
bib info
-
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
, 465-482,
Rosario Gennaro
,
Craig Gentry
,
Bryan Parno
-
Multiparty Computation
-
Protocols for Multiparty Coin Toss with Dishonest Majority.
, 538-557,
Amos Beimel
,
Eran Omri
,
Ilan Orlov
bib info -
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost.
, 558-576,
Ivan Damgård
,
Claudio Orlandi
bib info -
Secure Multiparty Computation with Minimal Interaction.
, 577-594,
Eyal Kushilevitz
,
Yuval Ishai
,
Anat Paskin
bib info -
A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.
, 595-612,
Manoj Prabhakaran
,
Mike Rosulek
,
Hemanta K. Maji
bib info
-
Protocols for Multiparty Coin Toss with Dishonest Majority.
, 538-557,
Amos Beimel
,
Eran Omri
,
Ilan Orlov
-
Pseudorandomness
-
On Generalized Feistel Networks.
, 613-630,
Phillip Rogaway
,
Viet Tung Hoang
bib info -
Cryptographic Extraction and Key Derivation: The HKDF Scheme.
, 631-648,
Hugo Krawczyk
bib info -
Time Space Tradeoffs for Attacks against One-Way Functions and PRGs.
, 649-665,
Luca Trevisan
,
Anindya De
,
Madhur Tulsiani
bib info -
Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks.
, 666-684,
Mihir Bellare
,
David Cash
bib info
-
On Generalized Feistel Networks.
, 613-630,
Phillip Rogaway
,
Viet Tung Hoang
-
Quantum
-
Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries.
, 685-706,
Jesper Buus Nielsen
,
Louis Salvail
,
Frédéric Dupuis
bib info -
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions.
, 707-723,
Jürg Wullschleger
,
Severin Winkler
bib info -
Sampling in a Quantum Population, and Applications.
, 724-741,
Serge Fehr
,
Niek J. Bouman
bib info
-
Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries.
, 685-706,
Jesper Buus Nielsen
,
Louis Salvail
,
Frédéric Dupuis