Overview
- Editors:
- Ivan Visconti
Dipartimento di Informatica, Università di Salerno, Fisciano, Italy
You can also search for this editor inPubMed Google Scholar
- Roberto Prisco
Dipartimento di Informatica, Università di Salerno, Fisciano, Italy
You can also search for this editor inPubMed Google Scholar
- Up-to-date results
- Fast-track conference proceedings
- State-of-the-art research
Part of the book series:Lecture Notes in Computer Science (LNCS, volume 7485)
Part of the book sub series:Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: SCN 2012.
This is a preview of subscription content,log in via an institution to check access.
Access this book
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
Tax calculation will be finalised at checkout
Other ways to access
About this book
This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012.
The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners.
Similar content being viewed by others
Keywords
Table of contents (31 papers)
Front Matter
Cryptography from Lattices
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting
- Xiang Xie, Rui Xue, Rui Zhang
Pages 1-18Ring Switching in BGV-Style Homomorphic Encryption
- Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart
Pages 19-37Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions
- Ivan Damgård, Adriana López-Alt
Pages 38-56Fully Anonymous Attribute Tokens from Lattices
- Jan Camenisch, Gregory Neven, Markus Rückert
Pages 57-75
Signature Schemes
Efficient Structure-Preserving Signature Scheme from Standard Assumptions
- Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev
Pages 76-94Compact Round-Optimal Partially-Blind Signatures
- Olivier Blazy, David Pointcheval, Damien Vergnaud
Pages 95-112History-Free Sequential Aggregate Signatures
- Marc Fischlin, Anja Lehmann, Dominique Schröder
Pages 113-130A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN
- Melissa Chase, Markulf Kohlweiss
Pages 131-148
Encryption Schemes I
Blackbox Construction of a More Than Non-MalleableCCA1 Encryption Scheme from Plaintext Awareness
- Steven Myers, Mona Sergi, abhi shelat
Pages 149-165Decentralized Dynamic Broadcast Encryption
- Duong Hieu Phan, David Pointcheval, Mario Strefler
Pages 166-183Time-Specific Encryption from Forward-Secure Encryption
- Kohei Kasamatsu, Takahiro Matsuda, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai
Pages 184-204
Efficient Two-Party and Multi-Party Computation
Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits
- Vladimir Kolesnikov, Ranjit Kumaresan
Pages 205-2215PM: Secure Pattern Matching
- Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler
Pages 222-240Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol
- Ivan Damgård, Marcel Keller, Enrique Larraia, Christian Miles, Nigel P. Smart
Pages 241-263
Security in the UC Framework
On the Centrality of Off-Line E-Cash to Concrete Partial Information Games
- Seung Geol Choi, Dana Dachman-Soled, Moti Yung
Pages 264-280
Cryptanalysis
On the Strength Comparison of the ECDLP and the IFP
- Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Tetsuya Izu
Pages 302-325Multiple Differential Cryptanalysis UsingLLR andχ2 Statistics
- Céline Blondeau, Benoît Gérard, Kaisa Nyberg
Pages 343-360
Other volumes
Security and Cryptography for Networks
Editors and Affiliations
Dipartimento di Informatica, Università di Salerno, Fisciano, Italy
Ivan Visconti, Roberto Prisco
Bibliographic Information
Book Title:Security and Cryptography for Networks
Book Subtitle:8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012, Proceedings
Editors:Ivan Visconti, Roberto Prisco
Series Title:Lecture Notes in Computer Science
DOI:https://doi.org/10.1007/978-3-642-32928-9
Publisher:Springer Berlin, Heidelberg
eBook Packages:Computer Science,Computer Science (R0)
Copyright Information:Springer-Verlag Berlin Heidelberg 2012
Softcover ISBN:978-3-642-32927-2Published: 03 August 2012
eBook ISBN:978-3-642-32928-9Published: 30 August 2012
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number:1
Number of Pages:XI, 582
Number of Illustrations:75 b/w illustrations
Topics:Cryptology,Systems and Data Security,Computer Communication Networks,Management of Computing and Information Systems,Computer Appl. in Administrative Data Processing