Skip to main content
  • Conference proceedings
  • © 2020

Advances in Cryptology – ASIACRYPT 2020

26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12493)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security

Conference proceedings info: ASIACRYPT 2020.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (29 papers)

  1. Front Matter

    Pages i-xv
  2. Multi-party Computation

    1. Front Matter

      Pages 1-1
    2. \(\mathtt {MOTIF}\): (Almost) Free Branching in GMW

      • David Heath, Vladimir Kolesnikov, Stanislav Peceny
      Pages 3-30
    3. Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning

      • Hao Chen, Miran Kim, Ilya Razenshteyn, Dragos Rotaru, Yongsoo Song, Sameer Wagh
      Pages 31-59
    4. On the Exact Round Complexity of Best-of-Both-Worlds Multi-party Computation

      • Arpita Patra, Divya Ravi, Swati Singla
      Pages 60-91
    5. MPC with Synchronous Security and Asynchronous Responsiveness

      • Chen-Da Liu-Zhang, Julian Loss, Ueli Maurer, Tal Moran, Daniel Tschudi
      Pages 92-119
    6. Secure MPC: Laziness Leads to GOD

      • Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai
      Pages 120-150
    7. Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over \(\mathbb {Z}/p^k\mathbb {Z} \)

      • Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Matthieu Rambaud, Chaoping Xing et al.
      Pages 151-180
    8. Towards Efficiency-Preserving Round Compression in MPC

      • Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain
      Pages 181-212
    9. Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs

      • Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
      Pages 244-276
  3. Secret Sharing

    1. Front Matter

      Pages 309-309
    2. Secret-Shared Shuffle

      • Melissa Chase, Esha Ghosh, Oxana Poburinnaya
      Pages 342-372
  4. Attribute-Based Encryption

    1. Front Matter

      Pages 373-373
    2. Adaptively Secure Inner Product Encryption from LWE

      • Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
      Pages 375-404
    3. Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions

      • Nuttapong Attrapadung, Junichi Tomida
      Pages 405-436
    4. Inner-Product Functional Encryption with Fine-Grained Access Control

      • Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu
      Pages 467-497

About this book

The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.

The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows:

Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis.

Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange.

Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.

 

Editors and Affiliations

  • Network Security Research Institute (NICT), Tokyo, Japan

    Shiho Moriai

  • Nanyang Technological University, Singapore, Singapore

    Huaxiong Wang

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access