CRYPTO 2010: 
Tal Rabin (Ed.):
Advances in Cryptology - CRYPTO 2010 - CRYPTO 2010,
30th Annual Cryptology Conference,
Santa Barbara, CA, USA,
August 15-19, 2010
Proceedings.
CRYPTO 2010
Santa Barbara, CA, USA,
August 15-19, 2010
Preface by Tal Rabin (Ed.):
Organizational Committee
|
Program Chairs: | |
Tal Rabin |
| General Chair: | | Zulfikar Ramzan |
Program Committee
| Michel Abdalla |
| Adi Akavia |
| Amos Beimel |
| Xavier Boyen |
| Christian Cachin |
| Serge Fehr |
| Carmit Hazay |
| Johan Håstad |
| Susan Hohenberger |
| Thomas Holenstein |
| Yael Tauman Kalai |
| John Kelsey |
| Eike Kiltz |
| Eyal Kushilevitz |
| Tanja Lange |
| Yehuda Lindell |
| Ilya Mironov |
| Tal Moran |
| Jesper Buus Nielsen |
| Eiji Okamoto |
| Pascal Paillier |
| Rafael Pass |
| Giuseppe Persiano |
| Thomas Peyrin |
| Leonid Reyzin |
| Matthew J. B. Robshaw |
| Palash Sarkar |
| Abhi Shelat |
| Vinod Vaikuntanathan |
| Brent Waters |
| Hoeteck Wee |
| Andrew Chi-Chih Yao |
External Referees
- Leakage
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Back)., 1-20, Shafi Goldwasser, Zvika Brakerski
bib info
- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks., 21-40, Krzysztof Pietrzak, Yevgeniy Dodis
bib info
- Protecting Cryptographic Keys against Continual Leakage., 41-58, Yevgeniy Vahlis, Ali Juma
bib info
- Securing Computation against Continuous Leakage., 59-79, Shafi Goldwasser, Guy N. Rothblum
bib info
- An Efficient and Parallel Gaussian Sampler for Lattices., 80-97, Chris Peikert
bib info
- Lattice
- Homomorphic Encryption
- Theory and Applications
- Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography., 173-190, Vipul Goyal, Amit Sahai, Yuval Ishai, Mohammad Mahmoody
bib info
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption., 191-208, Tatsuaki Okamoto, Katsuyuki Takashima
bib info
- Structure-Preserving Signatures and Commitments to Group Elements., 209-236, Masayuki Abe, Miyako Ohkubo, Jens Groth, Georg Fuchsbauer, Kristiyan Haralambiev
bib info
- Efficient Indifferentiable Hashing into Ordinary Elliptic Curves., 237-254, Jean-Sébastien Coron, Eric Brier, Thomas Icart, Mehdi Tibouchi, David Madore, Hugues Randriam
bib info
- Key Exchange, OAEP/RSA, CCA
- Credential Authenticated Identification and Key Exchange., 255-276, Jan Camenisch, Victor Shoup, Thomas Groß, Nathalie Casati
bib info
- Password-Authenticated Session-Key Generation on the Internet in the Plain Model., 277-294, Rafail Ostrovsky, Vipul Goyal, Abhishek Jain 0002
bib info
- Instantiability of RSA-OAEP under Chosen-Plaintext Attack., 295-313, Eike Kiltz, Adam Smith, Adam O'Neill
bib info
- Efficient Chosen-Ciphertext Security via Extractable Hash Proofs., 314-332, Hoeteck Wee
bib info
- Attacks
- Factorization of a 768-Bit RSA Modulus., 333-350, Arjen K. Lenstra, Peter L. Montgomery, Kazumaro Aoki, Paul Zimmermann, Pierrick Gaudry, Emmanuel Thomé, Jens Franke, Thorsten Kleinjung, Dag Arne Osvik, Joppe W. Bos, Alexander Kruppa, bib info
- Correcting Errors in RSA Private Keys., 351-369, Alexander May, Wilko Henecka, Alexander Meurer
bib info
- Improved Differential Attacks for ECHO and Grøstl., 370-392, Thomas Peyrin
bib info
- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony., 393-410, Orr Dunkelman, Nathan Keller, Adi Shamir
bib info
- Composition
- Universally Composable Incoercibility., 411-428, Dominique Unruh, Jörn Müller-Quade
bib info
NULL
- Concurrent Non-Malleable Zero Knowledge Proofs., 429-446, Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam, Huijia Lin
bib info
- Equivalence of Uniform Key Agreement and Composition Insecurity., 447-464, Rafail Ostrovsky, Chongwon Cho, Chen-Kuei Lee
bib info
- Computation Delegation and Obfuscation
- Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers., 465-482, Rosario Gennaro, Craig Gentry, Bryan Parno
bib info
- Improved Delegation of Computation Using Fully Homomorphic Encryption., 483-501, Salil P. Vadhan, Yael Tauman Kalai, Kai-Min Chung
bib info
- Oblivious RAM Revisited., 502-519, Benny Pinkas, Tzachy Reinman
bib info
- On Strong Simulation and Composable Point Obfuscation., 520-537, Ran Canetti, Nir Bitansky
bib info
- Multiparty Computation
- Protocols for Multiparty Coin Toss with Dishonest Majority., 538-557, Amos Beimel, Eran Omri, Ilan Orlov
bib info
- Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost., 558-576, Ivan Damgård, Claudio Orlandi
bib info
- Secure Multiparty Computation with Minimal Interaction., 577-594, Eyal Kushilevitz, Yuval Ishai, Anat Paskin
bib info
- A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security., 595-612, Manoj Prabhakaran, Mike Rosulek, Hemanta K. Maji
bib info
- Pseudorandomness
- On Generalized Feistel Networks., 613-630, Phillip Rogaway, Viet Tung Hoang
bib info
- Cryptographic Extraction and Key Derivation: The HKDF Scheme., 631-648, Hugo Krawczyk
bib info
- Time Space Tradeoffs for Attacks against One-Way Functions and PRGs., 649-665, Luca Trevisan, Anindya De, Madhur Tulsiani
bib info
- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks., 666-684, Mihir Bellare, David Cash
bib info
- Quantum
- Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries., 685-706, Jesper Buus Nielsen, Louis Salvail, Frédéric Dupuis
bib info
- On the Efficiency of Classical and Quantum Oblivious Transfer Reductions., 707-723, Jürg Wullschleger, Severin Winkler
bib info
- Sampling in a Quantum Population, and Applications., 724-741, Serge Fehr, Niek J. Bouman
bib info