![](https://bbs-cdn.datacourse.cn/static/image/filetype/pdf.gif)
![41tfshsud5L._SX327_BO1,204,203,200_.jpg 41tfshsud5L._SX327_BO1,204,203,200_.jpg](https://bbs-cdn.datacourse.cn/static/image/common/none.gif)
The two-volume proceedings LNCS 9665 + 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes were carefully reviewed and selected from 274 submissions. The papers are organized in topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash functions; multilinear maps; message authentification codes; attacks on SSL/TLS; real-world protocols; robust designs; lattice reduction; latticed-based schemes; zero-knowledge; pseudorandom functions; multi-party computation; separations; protocols; round complexity; commitments; lattices; leakage; in differentiability; obfuscation; and automated analysis, functional encryption, and non-malleable codes.
Contents – Part II
Lattice-Based Schemes
Zero-Knowledge Arguments for Lattice-Based Accumulators:
Logarithmic-Size Ring Signatures and Group Signatures
Without Trapdoors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Benoît Libert, San Ling, Khoa Nguyen, and Huaxiong Wang
Adaptively Secure Identity-Based Encryption from Lattices
with Asymptotically Shorter Public Parameters . . . . . . . . . . . . . . . . . . . . . . 32
Shota Yamada
Zero-Knowledge I
Online/Offline OR Composition of Sigma Protocols . . . . . . . . . . . . . . . . . . 63
Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro,
Luisa Siniscalchi, and Ivan Visconti
Constant-Round Leakage-Resilient Zero-Knowledge
from Collision Resistance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Susumu Kiyoshima
Pseudorandom Functions
Constrained Pseudorandom Functions for Unconstrained Inputs . . . . . . . . . . 124
Apoorvaa Deshpande, Venkata Koppula, and Brent Waters
Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN. . . 154
Yu Yu and John Steinberger
Multi-Party Computation I
Secure Computation from Elastic Noisy Channels. . . . . . . . . . . . . . . . . . . . 184
Dak*****a Khurana, Hemanta K. Maji, and Amit Sahai
All Complete Functionalities are Reversible . . . . . . . . . . . . . . . . . . . . . . . . 213
Dak*****a Khurana, Daniel Kraschewski, Hemanta K. Maji,
Manoj Prabhakaran, and Amit Sahai
Separations
On the Power of Hierarchical Identity-Based Encryption . . . . . . . . . . . . . . . 243
Mohammad Mahmoody and Ameer Mohammed
On the Impossibility of Tight Cryptographic Reductions . . . . . . . . . . . . . . . 273
Christoph Bader, Tibor Jager, Yong Li, and Sven Schäge
Zero-Knowledge II
On the Size of Pairing-Based Non-interactive Arguments. . . . . . . . . . . . . . . 305
Jens Groth
Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the
Discrete Log Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth,
and Christophe Petit
Protocols
On the Complexity of Scrypt and Proofs of Space in the Parallel Random
Oracle Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
Joël Alwen, Binyi Chen, Chethan Kamath, Vladimir Kolmogorov,
Krzysztof Pietrzak, and Stefano Tessaro
Anonymous Traitor Tracing: How to Embed Arbitrary Information
in a Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
Ryo Nishimaki, Daniel Wichs, and Mark Zhandry
Round Complexity
Unconditionally Secure Computation with Reduced Interaction. . . . . . . . . . . 420
Ivan Damgård, Jesper Buus Nielsen, Rafail Ostrovsky, and Adi Rosén
The Exact Round Complexity of Secure Computation . . . . . . . . . . . . . . . . . 448
Sanjam Garg, Pratyay Mukherjee, Omkant Pandey,
and Antigoni Polychroniadou
Commitments
On the Composition of Two-Prover Commitments, and Applications
to Multi-round Relativistic Commitments. . . . . . . . . . . . . . . . . . . . . . . . . . 477
Serge Fehr and Max Fillinger
Computationally Binding Quantum Commitments . . . . . . . . . . . . . . . . . . . . 497
Dominique Unruh
Lattices
Structural Lattice Reduction: Generalized Worst-Case to Average-Case
Reductions and Homomorphic Cryptosystems. . . . . . . . . . . . . . . . . . . . . . . 528
Nicolas Gama, Malika Izabachène, Phong Q. Nguyen, and Xiang Xie
Recovering Short Generators of Principal Ideals in Cyclotomic Rings . . . . . . 559
Ronald Cramer, Léo Ducas, Chris Peikert, and Oded Regev
Leakage
Circuit Compilers with Oe1=logenTT Leakage Rate . . . . . . . . . . . . . . . . . . . 586
Marcin Andrychowicz, Stefan Dziembowski, and Sebastian Faust
Randomness Complexity of Private Circuits for Multiplication . . . . . . . . . . . 616
Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue,
Emmanuel Prouff, Adrian Thillard, and Damien Vergnaud
Indifferentiability
10-Round Feistel is Indifferentiable from an Ideal Cipher. . . . . . . . . . . . . . . 649
Dana Dachman-Soled, Jonathan Katz, and Aishwarya Thiruvengadam
Indifferentiability of Confusion-Diffusion Networks. . . . . . . . . . . . . . . . . . . 679
Yevgeniy Dodis, Martijn Stam, John Steinberger, and Tianren Liu
Multi-Party Computation II
Fair and Robust Multi-party Computation Using a Global
Transaction Ledger . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
Aggelos Kiayias, Hong-Sheng Zhou, and Vassilis Zikas
Two Round Multiparty Computation via Multi-key FHE . . . . . . . . . . . . . . . 735
Pratyay Mukherjee and Daniel Wichs
Obfuscation
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case
of Evasive Circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764
Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, and Mark Zhandry
New Negative Results on Differing-Inputs Obfuscation . . . . . . . . . . . . . . . . 792
Mihir Bellare, Igors Stepanovs, and Brent Waters
Automated Analysis, Functional Encryption, and Non-malleable Codes
Automated Unbounded Analysis of Cryptographic Constructions
in the Generic Group Model. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 822
Miguel Ambrona, Gilles Barthe, and Benedikt Schmidt
Multi-input Functional Encryption in the Private-Key Setting: Stronger
Security from Weaker Assumptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852
Zvika Brakerski, Ilan Komargodski, and Gil Segev
Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits . . . . . . . 881
Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, and Tal Malkin
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 909