Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings

Front Cover
Cynthia Dwork
Springer Science & Business Media, Aug 8, 2006 - Business & Economics - 619 pages
0 Reviews

This book constitutes the refereed proceedings of the 26th Annual International Cryptology Conference, CRYPTO 2006, held in Santa Barbara, California, USA in August 2006. The 34 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 250 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Rigorous Bounds on Cryptanalytic TimeMemory Tradeoffs
1
On the Power of the Randomized Iterate
22
Strengthening Digital Signatures Via Randomized Hashing
41
RoundOptimal Composable Blind Signatures in the Common Reference String Model
60
On Signatures of Knowledge
78
Noninteractive Zaps and New Techniques for NIZK
97
Rankins Constant and Blockwise Lattice Reduction
112
LatticeBased Cryptography
131
Inverting HFE Is Quasipolynomial
345
Cryptanalysis of 2R Schemes
357
ReceiptFree UniversallyVerifiable Voting with Everlasting Privacy
373
Cryptographic Protocols for Electronic Voting
393
Asymptotically Optimal TwoRound Perfectly Secure Message Transmission
394
Random Selection with an Adversarial Majority
409
Oblivious Transfer and Linear Functions
427
On Expected ConstantRound Protocols for Byzantine Agreement
445

A Method for Making PasswordBased Key Exchange Resilient to Server Compromise
142
Mitigating Dictionary Attacks on PasswordProtected Local Storage
160
Rationality and Adversarial Behavior in Multiparty Computation
180
When Random Sampling Preserves Privacy
198
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
214
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
232
On ForwardSecure Storage
251
Construction of a Nonmalleable Encryption Scheme from Any Semantically Secure One
271
Anonymous Hierarchical IdentityBased Encryption Without Random Oracles
290
Fast Algorithms for the Free Riders Problem in Broadcast Encryption
308
The Number Field Sieve in the Medium Prime Case
326
Robust Multiparty Computation with Linear Communication Complexity
463
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation
483
Scalable Secure Multiparty Computation
501
Algebraic Geometric Secret Sharing Schemes and Secure MultiParty Computations over Small Fields
521
Automated Security Proofs with Sequences of Games
537
On Robust Combiners for Private Information Retrieval and Other Primitives
555
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
570
On the Higher Order Nonlinearities of Algebraic Immune Functions
584
Security Without CollisionResistance
602
Author Index
620
Copyright

Other editions - View all

Common terms and phrases

About the author (2006)

Roth, Aaron

Bibliographic information