Ebook: Security and Cryptography for Networks: 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings
- Tags: Data Encryption, Systems and Data Security, Computer Communication Networks, Management of Computing and Information Systems, Computer Appl. in Administrative Data Processing
- Series: Lecture Notes in Computer Science 7485
- Year: 2012
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012.
The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners.
This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012.
The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners.
This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012.
The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners.
Content:
Front Matter....Pages -
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting....Pages 1-18
Ring Switching in BGV-Style Homomorphic Encryption....Pages 19-37
Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions....Pages 38-56
Fully Anonymous Attribute Tokens from Lattices....Pages 57-75
Efficient Structure-Preserving Signature Scheme from Standard Assumptions....Pages 76-94
Compact Round-Optimal Partially-Blind Signatures....Pages 95-112
History-Free Sequential Aggregate Signatures....Pages 113-130
A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN....Pages 131-148
Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness....Pages 149-165
Decentralized Dynamic Broadcast Encryption....Pages 166-183
Time-Specific Encryption from Forward-Secure Encryption....Pages 184-204
Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits....Pages 205-221
5PM: Secure Pattern Matching....Pages 222-240
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol....Pages 241-263
On the Centrality of Off-Line E-Cash to Concrete Partial Information Games....Pages 264-280
Universally Composable Security with Local Adversaries....Pages 281-301
On the Strength Comparison of the ECDLP and the IFP....Pages 302-325
New Attacks for Knapsack Based Cryptosystems....Pages 326-342
Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings....Pages 343-360
Homomorphic Encryption for Multiplications and Pairing Evaluation....Pages 361-373
Publicly Verifiable Ciphertexts....Pages 374-392
Public-Key Encryption with Lazy Parties....Pages 393-410
Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation....Pages 411-425
MAC Aggregation with Message Multiplicity....Pages 426-444
Efficiency Limitations of ?-Protocols for Group Homomorphisms Revisited....Pages 445-460
A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument....Pages 461-476
Active Security in Multiparty Computation over Black-Box Groups....Pages 477-502
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output....Pages 503-521
Human Perfectly Secure Message Transmission Protocols and Their Applications....Pages 522-539
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption....Pages 540-558
Back Matter....Pages 559-579
....Pages -