[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-3-031-56235-8guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
Progress in Cryptology – INDOCRYPT 2023: 24th International Conference on Cryptology in India, Goa, India, December 10–13, 2023, Proceedings, Part II
2023 Proceeding
  • Editors:
  • Anupam Chattopadhyay,
  • Shivam Bhasin,
  • Stjepan Picek,
  • Chester Rebeiro
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
International Conference on Cryptology in IndiaGoa, India10 December 2023
ISBN:
978-3-031-56234-1
Published:
11 April 2024

Reflects downloads up to 10 Dec 2024Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
front-matter
Front Matter
Pages i–xxii
back-matter
Back Matter
Article
Front Matter
Page 1
Article
Threshold-Optimal MPC with Friends and Foes
Abstract

Alon et al. (Crypto 2020) initiated the study of MPC with Friends and Foes (FaF) security, which captures the desirable property that even up to h honest parties should learn nothing additional about other honest parties’ inputs, even if the t ...

Article
Network-Agnostic Perfectly Secure Message Transmission Revisited
Abstract

Secure Message Transmission (SMT) is one of the fundamental primitives in secure distributed computing. Consider two nodes A and B, connected by nnode-disjoint channels, a subset of which may be under the control of a computationally-unbounded ...

Article
Explicit Lower Bounds for Communication Complexity of PSM for Concrete Functions
Abstract

Private Simultaneous Messages (PSM) is a minimal model of secure computation, where the input players with shared randomness send messages to the output player simultaneously and only once. In this field, finding upper and lower bounds on ...

Article
Distributed Protocols for Oblivious Transfer and Polynomial Evaluation
Abstract

A secure multiparty computation (MPC) allows several parties to compute a function over their inputs while keeping their inputs private. In its basic setting, the protocol involves only parties that hold inputs. In distributed MPC, there are also ...

Article
Obfuscating Evasive Decision Trees
Abstract

We present a new encoder for hiding parameters in an interval membership function. As an application, we design a simple and efficient virtual black-box obfuscator for evasive decision trees. The security of our construction is proved in the ...

Article
Privacy-Preserving Plagiarism Checking
Abstract

Plagiarism is a pressing issue in academia and industry, where individuals often modify existing content without providing due credit to the original creator and unethically claiming the work to be their own. Existing plagiarism detection tools ...

Article
PURED: A Unified Framework for Resource-Hard Functions
Abstract

Algorithm hardness can be described by 5 categories: hardness in computation, in sequential computation, in memory, in energy consumption (or bandwidth), in code size. Similarly, hardness can be a concern for solving or for verifying, depending on ...

Article
Front Matter
Page 151
Article
Implementing Lattice-Based PQC on Resource-Constrained Processors:: A Case Study for Kyber/Saber’s Polynomial Multiplication on ARM Cortex-M0/M0+
Abstract

This paper studies the implementation of the lattice-based PQC on the 32-bit constrained processors that only have constrained multiplication instructions. A typical example of such constrained processors is the ARM Cortex-M0/M0+, which features a ...

Article
Algorithmic Views of Vectorized Polynomial Multipliers – NTRU
Abstract

The lattice-based post-quantum cryptosystem NTRU is used by Google for protecting Google’s internal communication. In NTRU, polynomial multiplication is one of bottleneck. In this paper, we explore the interactions between polynomial ...

Article
VDOO: A Short, Fast, Post-quantum Multivariate Digital Signature Scheme
Abstract

Hard lattice problems are predominant in constructing post-quantum cryptosystems. However, we need to continue developing post-quantum cryptosystems based on other quantum hard problems to prevent a complete collapse of post-quantum cryptography ...

Article
Secure Boot in Post-Quantum Era: (Invited Paper)
Abstract

Secure boot is a standard feature for ensuring the authentication and integrity of software. For this purpose, secure boot leverages the advantage of Public Key Cryptography (PKC). However, the fast-developing quantum computers have posed serious ...

Article
Patent Landscape in the field of Hash-Based Post-Quantum Signatures: (Invited Paper)
Abstract

Post-Quantum Cryptography (PQC) is one of the most fascinating topics of recent developments in cryptography. Following the ongoing standardization process of PQC by NIST, industry and academia both have been engaged in PQC research with great ...

Contributors
  • School of Computer Science and Engineering
  • Temasek Laboratories @ NTU
  • Delft University of Technology
  • Indian Institute of Technology Madras
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations