LEADER 05503nam 22007695 450 001 9910510579703321 005 20251225181943.0 010 $a3-030-92068-2 024 7 $a10.1007/978-3-030-92068-5 035 $a(CKB)5100000000149406 035 $a(MiAaPQ)EBC6819764 035 $a(Au-PeEL)EBL6819764 035 $a(PPN)258838892 035 $a(BIP)82384553 035 $a(BIP)82050717 035 $a(DE-He213)978-3-030-92068-5 035 $a(EXLCZ)995100000000149406 100 $a20211130d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? ASIACRYPT 2021 $e27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6?10, 2021, Proceedings, Part IV /$fedited by Mehdi Tibouchi, Huaxiong Wang 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (784 pages) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v13093 311 08$a3-030-92067-4 320 $aIncludes bibliographical references and index. 327 $aNTRU Fatigue: How Stretched is Overstretched? -- Faster Dual Lattice Attacks for Solving LWE -- with applications to CRYSTALS -- Lattice sieving via quantum random walks -- A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs -- Gladius: LWR based efficient hybrid public key encryption with distributed decryption -- Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy -- A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV -- Shorter Lattice-Based Group Signatures via ``Almost Free'' Encryption and Other Optimizations -- Séta: Supersingular Encryption from Torsion Attacks -- SHealS and HealS: isogeny-based PKEs from a key validation method for SIDH -- Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups -- Public Key Encryption with Flexible Pattern Matching -- Bounded Collusion ABE for TMs from IBE -- Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting -- (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin -- Boosting the Security of Blind Signature Schemes -- PrORAM: Fast O(log n) Authenticated Shares ZK ORAM -- Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures -- Promise $\Sigma$-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups -- The One-More Discrete Logarithm Assumption in the Generic Group Model -- Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge -- Chain Reductions for Multi-Signatures and the HBMS Scheme -- Symmetric Key Exchange with Full Forward Security and Robust Synchronization -- Security Analysis of CPace -- Modular Design of Role-Symmetric Authenticated Key Exchange Protocols. 330 $aThe four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v13093 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer engineering 606 $aComputer networks 606 $aCoding theory 606 $aInformation theory 606 $aData protection 606 $aCryptology 606 $aComputer Engineering and Networks 606 $aCoding and Information Theory 606 $aComputer Communication Networks 606 $aData and Information Security 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aData protection. 615 14$aCryptology. 615 24$aComputer Engineering and Networks. 615 24$aCoding and Information Theory. 615 24$aComputer Communication Networks. 615 24$aData and Information Security. 676 $a001.5436 702 $aTibouchi$b Mehdi 702 $aWang$b Huaxiong 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910510579703321 996 $aAdvances in cryptology - ASIACRYPT 2021$92906579 997 $aUNINA