Information security and cryptology : 13th international conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, revised selected papers / Xiaofeng Chen, Dongdai Lin, Moti Yung, (eds)
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully revi...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | , , |
Format: | Conference Proceeding eBook |
Language: | English |
Published: |
Cham, Switzerland :
Springer,
2018.
|
Series: | Lecture notes in computer science ;
10726. LNCS sublibrary. Security and cryptology. |
Subjects: |
Table of Contents:
- Keynote speeches ; Security and privacy in the IoT / Elisa Bertino
- On crossroads of privacy protection / Mirosław Kutyłowski
- The dual role of smartphones in IoT security / Kui Ren
- Cryptographic protocols and algorithms ; Implementing indistinguishability obfuscation using GGH15 / Zheng Zhang, Fangguo Zhang, and Huang Zhang
- From attack on Feige-Shamir to construction of oblivious transfer / Jingyue Yu, Yi Deng, and Yu Chen
- A new lattice sieving algorithm base on angular locality-sensitive hashing / Ping Wang and Dongdong Shang
- A simpler Bitcoin voting protocol / Haibo Tian, Liqing Fu, and Jiejie He
- Post-quantum secure remote password protocol from RLWE problem / Xinwei Gao, Jintai Ding, Jiqiang Liu, and Lin Li
- Hashing into twisted Jacobi intersection curves / Xiaoyang He, Wei Yu, and Kunpeng Wang
- Digital signatures ; Identity-based key-insulated aggregate signatures, revisited / Nobuaki Kitajima, Naoto Yanai, and Takashi Nishide
- A new constant-size accountable ring signature scheme without random oracles / Sudhakar Kumawat and Souradyuti Paul
- A universal designated multi-verifier transitive signature scheme / Fei Zhu, Yuexin Zhang, Chao Lin, Wei Wu, and Ru Meng
- Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme / Xiaodong Yang, Ping Yang, Faying An, Shudong Li, Caifen Wang, and Dengguo Feng
- Encryption ; Parallel long messages encryption scheme based on certificateless cryptosystem for big data / Xuguang Wu, Yiliang Han, Minqing Zhang, and Shuaishuai Zhu
- Constant decryption-cost non-monotonic ciphertext policy attribute-based encryption with reduced secret key size (and dynamic attributes) / Geng Wang, Xiao Zhang, and Yanmei Li
- Fully homomorphic encryption scheme based on public key compression and batch processing / Liquan Chen, Ming Lim, and Muyang Wang
- Leveled FHE with matrix message space / Biao Wang, Xueqing Wang, and Rui Xue
- Predicate fully homomorphic encryption: achieving fine-grained access control over manipulable ciphertext / Hanwen Feng, Jianwei Liu, Qianhong Wu, and Weiran Liu.
- Cryptanalysis and attack ; NativeSpeaker : identifying crypto misuses in Android native code libraries / Qing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li, and Dawu Gu
- A game-based framework towards cyber-attacks on state estimation in ICSs / Cong Chen, Dongdai Lin, Wei Zhang, and Xiaojun Zhou
- Cryptanalysis of Acorn in nonce-reuse setting / Xiaojuan Zhang and Dongdai Lin
- An improved method to unveil malware's hidden behavior / Qiang Li, Yunan Zhang, Liya Su, Yang Wu, Xinjian Ma, and Zeming Yang
- BotTokenizer : exploring network tokens of HTTP-based botnet using malicious network traces / Biao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, and Jianguo Jiang
- Improved cryptanalysis of an ISO standard lightweight block cipher with refined MILP modelling / Jun Yin, Chuyan Ma, Lijun Lyu, Jian Song, Guang Zeng, Chuangui Ma, and Fushan Wei
- Meet in the middle attack on type-1 Feistel construction / Yuanhao Deng, Chenhui Jin, and Rongjia Li
- Applications ; Influence of error on Hamming weights for ASCA / Chujiao Ma, John Chandy, Laurent Michel, Fanghui Liu, and Waldemar Cruz
- State-of-the-art : security competition in talent education / Xiu Zhang, Baoxu Liu, Xiaorui Gong, and Zhenyu Song
- A modified fuzzy fingerprint vault based on pair-polar minutiae structures / Xiangmin Li, Ning Ding, Haining Lu, Dawu Gu, Shanshan Wang, Beibei Xu, Yuan Yuan, and Siyun Yan
- NOR : towards non-intrusive, real-time and OS-agnostic introspection for virtual machines in cloud environment / Chonghua Wang, Zhiyu Hao, and Xiaochun Yun
- A method to enlarge the design distance of BCH codes and some classes of infinite optimal cyclic codes / Shanding Xu, Xiwang Cao, and Chunming Tang.