This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.We say that PPT algorithms In = (KeyGen, Enc, Dec) is a labeled public key encryption scheme (LPKE) with perfect decryption ... An adversary is admissible if it does not query Dec(Am)(dk, Am) with (L, c) In this work we require a weaker notion, calledanbsp;...
|Title||:||Advances in Cryptology -- ASIACRYPT 2012|
|Author||:||Xiaoyun Wang, Kazue Sako|
|Publisher||:||Springer Science & Business Media - 2012-11-19|