Limit search to available items
Book Cover
E-book
Author ACISP (Conference) (23rd : 2018 : Wollongong, N.S.W.)

Title Information security and privacy : 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings / Willy Susilo, Guomin Yang (eds.)
Published Cham, Switzerland : Springer, [2018]

Copies

Description 1 online resource (xv, 833 pages)
Series Lecture Notes in Computer Science, 0302-9743 ; 10946
Lecture notes in computer science ; 10946. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro -- Preface -- ACISP 2018 -- Contents -- Foundation -- A Deterministic Algorithm for Computing Divisors in an Interval -- 1 Introduction -- 1.1 Our Contributions -- 2 Preliminaries -- 3 Review Kim-Cheon's Algorithms -- 4 Our Deterministic Algorithm -- 4.1 Algorithmic Details -- 4.2 Logarithmic Speedup -- 5 Conclusion -- References -- Reusable Fuzzy Extractor from LWE -- 1 Introduction -- 1.1 Our Contribution -- 2 Preliminaries -- 2.1 Metric Spaces -- 2.2 Min-Entropy and Statistical Distance -- 2.3 Universal Hashing -- 2.4 Secure Sketch -- 2.5 Learning with Error (LWE) Problem
3 Reusable Fuzzy Extractor -- 3.1 Construction of Reusable Fuzzy Extractor from LWE -- 4 Conclusion -- References -- A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction -- 1 Introduction -- 2 Preliminaries -- 2.1 Entropy -- 2.2 Fuzzy Extractor and Reusability -- 2.3 (,m)-Threshold Scheme -- 3 Canetti et al.'s Reusable Fuzzy Extractor -- 3.1 Sources with -Entropy k-Samples -- 3.2 Digital Lockers -- 3.3 Description -- 3.4 Analysis on Concrete Parameters -- 4 Our Construction and Analysis -- 4.1 Construction -- 4.2 Parameters and Security Analysis
4.3 Analysis on Concrete Parameters -- 5 Conclusion -- References -- 21 -- Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State -- 1 Introduction -- 1.1 Our Contributions -- 2 Preliminaries -- 3 Modeling Card Games Without Secret State -- 4 The Framework -- 5 Optimizing Our Protocol -- 6 Concrete Complexity Analysis -- References -- Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority -- 1 Introduction -- 1.1 Bit Decomposition and Modulus Conversion -- 1.2 Our Contribution -- 1.3 Technical Overview -- 1.4 Related Work
2 Preliminaries -- 2.1 Mersenne Prime -- 2.2 Security Model and Definition -- 2.3 Secret Sharing -- 3 Quotient Transfer -- 4 Bit-Decomposition Protocol -- 4.1 Equation for Bit Decomposition -- 4.2 Passively Secure Bit-Decomposition Protocol -- 4.3 Efficiency -- 4.4 Achieving Active Security Using Replicated SS -- 5 Modulus-Conversion Protocol -- 5.1 Generating a Pair of Random Shares -- 5.2 Modulus-Conversion Protocol from Z2u to Zp -- 5.3 Equation for Modulus Conversion -- 5.4 Our Modulus-Conversion Protocol -- 5.5 Efficiency -- 6 Experiments -- 7 Conclusion -- References
Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems -- 1 Introduction -- 2 Related Works -- 3 Verifiable Secret Sharing Based on Hyperplane Geometry -- 3.1 Model and Assumptions -- 3.2 Verifiable Secret Sharing Based on Hyperplane Geometry -- 3.3 Security Analysis -- 3.4 Some Observations -- 4 A Proactive Secret Sharing Scheme -- 4.1 Model and Assumptions -- 4.2 The Proposed Scheme -- 4.3 Security Analysis -- 4.4 Efficiency Analysis -- 5 Discussion and Conclusion -- References
Summary This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency
Subject Computer security -- Congresses
Computers -- Access control -- Congresses
Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Coding theory & cryptology.
Ethical & social aspects of IT.
Legal aspects of IT.
Network hardware.
Computer security.
Computers -- Security -- General.
Computers -- Information Theory.
Computers -- Social Aspects -- General.
Law -- Science & Technology.
Computers -- Hardware -- Network Hardware.
Computers -- Access control
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Genre/Form Electronic books
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Susilo, Willy, editor
Yang, Guomin, Dr., editor.
ISBN 9783319936383
3319936387
Other Titles ACISP 2018