Limit search to available items
Book Cover
E-book
Author SCN 2012 (2012 : Amalfi, Italy)

Title Security and cryptography for networks : 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings / Ivan Visconti, Roberto De Prisco (eds.)
Published Berlin ; New York : Springer, [2012]
©2012
Online access available from:
Springer eBooks    View Resource Record  

Copies

Description 1 online resource
Series Lecture notes in computer science, 0302-9743 ; 7485
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7485
LNCS sublibrary. SL 4, Security and cryptology.
Contents Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting / Xiang Xie, Rui Xue and Rui Zhang -- Ring Switching in BGV-Style Homomorphic Encryption / Craig Gentry, Shai Halevi, Chris Peikert and Nigel P. Smart -- Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions / Ivan Damgård and Adriana López-Alt -- Fully Anonymous Attribute Tokens from Lattices / Jan Camenisch, Gregory Neven and Markus Rückert -- Efficient Structure-Preserving Signature Scheme from Standard Assumptions / Jan Camenisch, Maria Dubovitskaya and Kristiyan Haralambiev -- Compact Round-Optimal Partially-Blind Signatures / Olivier Blazy, David Pointcheval and Damien Vergnaud -- History-Free Sequential Aggregate Signatures / Marc Fischlin, Anja Lehmann and Dominique Schröder -- A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN / Melissa Chase and Markulf Kohlweiss
Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness / Steven Myers, Mona Sergi and abhi shelat -- Decentralized Dynamic Broadcast Encryption / Duong Hieu Phan, David Pointcheval and Mario Strefler -- Time-Specific Encryption from Forward-Secure Encryption / Kohei Kasamatsu, Takahiro Matsuda, Keita Emura, Nuttapong Attrapadung and Goichiro Hanaoka, et al. -- Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits / Vladimir Kolesnikov and Ranjit Kumaresan -- 5PM: Secure Pattern Matching / Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky and Eric Tressler -- Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol / Ivan Damgård, Marcel Keller, Enrique Larraia, Christian Miles and Nigel P. Smart -- On the Centrality of Off-Line E-Cash to Concrete Partial Information Games / Seung Geol Choi, Dana Dachman-Soled and Moti Yung -- Universally Composable Security with Local Adversaries / Ran Canetti and Margarita Vald
On the Strength Comparison of the ECDLP and the IFP / Masaya Yasuda, Takeshi Shimoyama, Jun Kogure and Tetsuya Izu -- New Attacks for Knapsack Based Cryptosystems / Gottfried Herold and Alexander Meurer -- Multiple Differential Cryptanalysis Using LLR and [chi]2 Statistics / Céline Blondeau, Benoît Gérard and Kaisa Nyberg -- Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings / Enrico Thomae -- Homomorphic Encryption for Multiplications and Pairing Evaluation / Guilhem Castagnos and Fabien Laguillaumie -- Publicly Verifiable Ciphertexts / Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy and Douglas Stebila -- Public-Key Encryption with Lazy Parties / Kenji Yasunaga -- Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation / Ching-Hua Yu and Bo-Yin Yang
MAC Aggregation with Message Multiplicity / Vladimir Kolesnikov -- Efficiency Limitations of [Sigma]-Protocols for Group Homomorphisms Revisited / Björn Terelius and Douglas Wikström -- A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument / Helger Lipmaa and Bingsheng Zhang -- Active Security in Multiparty Computation over Black-Box Groups / Yvo Desmedt, Josef Pieprzyk and Ron Steinfeld -- Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output / Arno Mittelbach -- Human Perfectly Secure Message Transmission Protocols and Their Applications / Stelios Erotokritou and Yvo Desmedt -- Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption / Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein and Gregory Neven
Summary This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners
Analysis Computer science
Computer Communication Networks
Data protection
Data encryption (Computer science)
Systems and Data Security
Management of Computing and Information Systems
Computer Appl. in Administrative Data Processing
Notes International conference proceedings
Bibliography Includes bibliographical references and author index
Subject Data encryption (Computer science) -- Congresses.
Computer networks -- Security measures -- Congresses.
Computer networks -- Access control -- Congresses.
Genre/Form Conference papers and proceedings.
Conference papers and proceedings.
Form Electronic book
Author Visconti, Ivan.
De Prisco, Roberto, 1968-
ISBN 9783642329289 (electronic bk.)
3642329284 (electronic bk.)
Other Titles SCN 2012