Skip to main content
  • Conference proceedings
  • © 2018

Advances in Cryptology – CRYPTO 2018

38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10993)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CRYPTO: Annual International Cryptology Conference

Conference proceedings info: CRYPTO 2018.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

    Pages I-XV
  2. Efficient MPC

    1. Front Matter

      Pages 1-1
    2. TinyKeys: A New Approach to Efficient Multi-Party Computation

      • Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
      Pages 3-33
    3. Fast Large-Scale Honest-Majority MPC for Malicious Adversaries

      • Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell et al.
      Pages 34-64
  3. Quantum Cryptography

    1. Front Matter

      Pages 65-65
    2. Quantum FHE (Almost) As Secure As Classical

      • Zvika Brakerski
      Pages 67-95
    3. IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited

      • Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma
      Pages 96-125
    4. Pseudorandom Quantum States

      • Zhengfeng Ji, Yi-Kai Liu, Fang Song
      Pages 126-152
    5. Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem

      • Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee
      Pages 184-210
  4. MPC

    1. Front Matter

      Pages 211-211
    2. Must the Communication Graph of MPC Protocols be an Expander?

      • Elette Boyle, Ran Cohen, Deepesh Data, Pavel Hubáček
      Pages 243-272
    3. Two-Round Multiparty Secure Computation Minimizing Public Key Operations

      • Sanjam Garg, Peihan Miao, Akshayaram Srinivasan
      Pages 273-301
    4. Limits of Practical Sublinear Secure Computation

      • Elette Boyle, Yuval Ishai, Antigoni Polychroniadou
      Pages 302-332
  5. Garbling

    1. Front Matter

      Pages 333-333
    2. Limits on the Power of Garbling Techniques for Public-Key Encryption

      • Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ameer Mohammed
      Pages 335-364
    3. Optimizing Authenticated Garbling for Faster Secure Two-Party Computation

      • Jonathan Katz, Samuel Ranellucci, Mike Rosulek, Xiao Wang
      Pages 365-391
  6. Information-Theoretic MPC

    1. Front Matter

      Pages 393-393
    2. Amortized Complexity of Information-Theoretically Secure MPC Revisited

      • Ignacio Cascudo, Ronald Cramer, Chaoping Xing, Chen Yuan
      Pages 395-426

About this book

The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018.
The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.

Editors and Affiliations

  • The University of Texas at Austin, Austin, USA

    Hovav Shacham

  • Georgia Institute of Technology, Atlanta, USA

    Alexandra Boldyreva

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access