Applied Cryptography and Network Security: 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings / Edition 1

Applied Cryptography and Network Security: 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings / Edition 1

by Jianying Zhou
     
 

ISBN-10: 3642137075

ISBN-13: 9783642137075

Pub. Date: 06/09/2010

Publisher: Springer Berlin Heidelberg

This book constitutes the proceedings of the 8th International Conference on Applied Cryptography and Network Security, ACNS 2010, held in Beijing, China, in June 2010.
The 32 papers presented in this volume were carefully reviewed and selected from 178 submissions. The papers are divided in topical sections on public key encryption, digital signature, block

Overview

This book constitutes the proceedings of the 8th International Conference on Applied Cryptography and Network Security, ACNS 2010, held in Beijing, China, in June 2010.
The 32 papers presented in this volume were carefully reviewed and selected from 178 submissions. The papers are divided in topical sections on public key encryption, digital signature, block ciphers and hash functions, side-channel attacks, zero knowledge and multi-party prools, key management, authentication and identification, privacy and anonymity, RFID security and privacy, and internet security.

Product Details

ISBN-13:
9783642137075
Publisher:
Springer Berlin Heidelberg
Publication date:
06/09/2010
Series:
Lecture Notes in Computer Science / Security and Cryptology Series, #6123
Edition description:
2010
Pages:
564
Product dimensions:
6.10(w) x 9.30(h) x 1.00(d)

Table of Contents

Public Key Encryption

On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption Aurélie Bauer Jean-Sébastien Coron David Naccache Mehdi Tibouchi Damien Vergnaud 1

How to Construct Interval Encryption from Binary Tree Encryption Huang Lin Zhenfu Cao Xiaohui Liang Muxin Zhou Haojin Zhu Dongsheng Xing 19

Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions Xavier Boyen Brent Waters 35

Digital Signature

Trapdoor Sanitizable Signatures Made Easy Dae Hyun Yum Jae Woo Seo Pil Joong Lee 53

Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs Markus Rückert Michael Schneider Dominique Schröder 69

Redactable Signatures for Tree-Structured Data: Definitions and Constructions Christina Brzuska Heike Busch Oezguer Dagdelen Marc Fischlin Martin Franz Stefan Katzenbeisser Mark Manulis Cristina Onete Andreas Peter Bertram Poettering Dominique Schröder 87

Block Ciphers and Hash Functions

Impossible Differential Cryptanalysis on Feistel Ciphers with S P and S P S Round Functions Yuechuan Wei Ping Li Bing Sun Chao Li 105

Multi-trail Statistical Saturation Attacks Baudoin Collard Francois-Xavier Standaert 123

Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G Alex Biryukov Deike Priemuth-Schmid Bin Zhang 139

High Performance GHASH Function for Long Messages Nicolas Méloni Christophe Négre M. Anwar Hasan 154

Side-Channel Attacks

Principles on the Security of AES against First and Second-Order Differential Power Analysis Jiqiang Lu Jing Pan Jerry den Hartog 168

Adaptive Chosen-Message Side-Channel Attacks Nicolas Veyrat-Charvillon François-Xavier Standaert 186

Secure Multiplicative Masking of Power Functions Laurie Genelle Emmanuel Prouff Michaël Quisquater 200

Zero Knowledge and Multi-party Protocols

Batch Groth-Sahai Olivier Blazy Georg Fuchsbauer Malika Izabachène Amandine Jambert Hervé Sibert Damien Vergnaud 218

Efficient and Secure Evaluation of Multivariate Polynomials and Applications Matthew Franklin Payman Mohassel 236

Efficient Implementation of the Orlandi Protocol Thomas P. Jakobsen Marc X. Makkes Janus Dam Nielsen 255

Improving the Round Complexity of Traitor Tracing Schemes Aggelos Kiayias Serdar Pehlivanoglu 273

Key Management

Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters Julien Bringer Hervé Chabanne Thomas Icart 291

Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead Rosario Gennaro Hugo Krawczyk Tal Rabin 309

Deniable Internet Key Exchange Andrew C. Yao Yunlei Zhao 329

Authentication and Identification

A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm Hassan Jameel Asghar Josef Pieprzyk Huaxiong Wang 349

Secure Sketch for Multiple Secrets Chengfang Fang Qiming Li Ee-Chien Chang 367

A Message Recognition Protocol Based on Standard Assumptions Atefeh Mashatan Serge Vaudenay 384

Privacy and Anonymity

Affiliation-Hiding Key Exchange with Untrusted Group Authorities Mark Manulis Bertram Poettering Gene Tsudik 402

Privacy-Preserving Group Discovery with Linear Complexity Mark Manulis Benny Pinkas Bertram Poettering 420

Two New Efficient PIR-writing Protocols Helger Lipmaa Bingsheng Zhang 438

Regulatory Compliant Oblivious RAM Bogdan Carbunar Radu Sion 456

RFID Security and Privacy

Revisiting Unpredictability-Based RFID Privacy Models Junzuo Lai Robert H. Deng Yingjiu Li 475

On RFID Privacy with Mutual Authentication and Tag Corruption Frederik Armknecht Ahmad-Reza Sadeghi Ivan Visconti Christian Wachsmann 493

Internet Security

Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures Erhan J. Kartaltepe Jose Andre Morales Shouhuai Xu Ravi Sandhu 511

COP: A Step toward Children Online Privacy Wei Xu Sencun Zhu Heng Xu 529

A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising Xuhua Ding 545

Author Index 563

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >