Download Advances in Cryptology - ASIACRYPT 2008: 14th International by Martin Hirt, Ueli Maurer, Vassilis Zikas (auth.), Josef PDF

By Martin Hirt, Ueli Maurer, Vassilis Zikas (auth.), Josef Pieprzyk (eds.)

This booklet constitutes the refereed court cases of the 14th overseas convention at the idea and alertness of Cryptology and knowledge safety, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008.

The 33 revised complete papers provided including the summary of one invited lecture have been conscientiously reviewed and chosen from 208 submissions. The papers are geared up in topical sections on muliti-party computation, cryptographic protocols, cryptographic hash capabilities, public-key cryptograhy, lattice-based cryptography, private-key cryptograhy, and research of circulate ciphers.

Show description

Read or Download Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings PDF

Similar cryptography books

Kryptografie: Verfahren, Protokolle, Infrastrukturen

Dieses umfassende Einführungs- und Übersichtswerk zur Kryptografie beschreibt eine große Zahl von Verschlüsselungs-, Signatur- und Hash-Verfahren in anschaulicher shape, ohne unnötig tief in die Mathematik einzusteigen. Hierbei kommen auch viele Methoden zur Sprache, die bisher kaum in anderen Kryptografiebüchern zu finden sind.

Advances in Software Science and Technology, Volume 5

This serial is a translation of the unique works in the Japan Society of software program technological know-how and know-how. A key resource of data for laptop scientists within the U. S. , the serial explores the key parts of study in software program and expertise in Japan. those volumes are meant to advertise all over the world alternate of principles between pros.

Extra info for Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

Sample text

4117, pp. 521–536. Springer, Heidelberg (2006) 4. : A note on secure computation of the MoorePenrose pseudoinverse and its spplication to secure linear algebra. In: Menezes, A. ) CRYPTO 2007. LNCS, vol. 4622, pp. 613–630. Springer, Heidelberg (2007) 5. : Strongly multiplicative ramp schemes from high degree rational points on curves. P. ) EUROCRYPT 2008. LNCS, vol. 4965, pp. 451–470. Springer, Heidelberg (2008) 6. : General secure multi-party computation from any linear secret-sharing scheme. In: Preneel, B.

On the other hand, secret sharing schemes from error-correcting codes give good multiplicative properties. It is well known that a secret sharing scheme from a linear error-correcting code is an LSSS. We know that such an LSSS is multiplicative provided the underlying code is a self dual code [7]. The LSSS from a Reed-Solomon code is λ-multiplicative if the corresponding access structure is Qλ . In this section, we show the multiplicativity of two other classes of secret sharing schemes from error-correcting codes: (i) schemes from Reed-Muller codes are λ-multiplicative LSSS; and (ii) schemes from algebraic geometric codes are λ-multiplicative ramp LSSS.

Let M(K, M, ψ, e1 ) be an MSP that computes a monotone Boolean function f . Then for all A ⊆ P , e1 ∈ span{MA} if and only if there exists ρ ∈ Kl−1 such that MA (1, ρ)τ = 0τ . 2 Multiplicative Linear Secret Sharing Schemes From Theorem 1, an LSSS can be identified with its corresponding MSP in the following way. Let M(K, M, ψ, e1 ) be an LSSS realizing the access structure AS. Given two vectors x = (x1 , . . , xd ), y = (y1 , . . , yd ) ∈ Kd , we define x y to 24 Z. Zhang et al. be the vector containing all entries of the form xi · yj with ψ(i) = ψ(j).

Download PDF sample

Rated 4.36 of 5 – based on 31 votes