Information security and cryptology : 13th international conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, revised selected papers / Xiaofeng Chen, Dongdai Lin, Moti Yung, (eds)

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully revi...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: Inscrypt (Conference) Xi'an, China)
Other Authors: Chen, Xiaofeng (Editor), Lin, Dongdai (Editor), Yung, Moti (Editor)
Format: Conference Proceeding eBook
Language:English
Published: Cham, Switzerland : Springer, 2018.
Series:Lecture notes in computer science ; 10726.
LNCS sublibrary. Security and cryptology.
Subjects:
Table of Contents:
  • Keynote speeches ; Security and privacy in the IoT / Elisa Bertino
  • On crossroads of privacy protection / Mirosław Kutyłowski
  • The dual role of smartphones in IoT security / Kui Ren
  • Cryptographic protocols and algorithms ; Implementing indistinguishability obfuscation using GGH15 / Zheng Zhang, Fangguo Zhang, and Huang Zhang
  • From attack on Feige-Shamir to construction of oblivious transfer / Jingyue Yu, Yi Deng, and Yu Chen
  • A new lattice sieving algorithm base on angular locality-sensitive hashing / Ping Wang and Dongdong Shang
  • A simpler Bitcoin voting protocol / Haibo Tian, Liqing Fu, and Jiejie He
  • Post-quantum secure remote password protocol from RLWE problem / Xinwei Gao, Jintai Ding, Jiqiang Liu, and Lin Li
  • Hashing into twisted Jacobi intersection curves / Xiaoyang He, Wei Yu, and Kunpeng Wang
  • Digital signatures ; Identity-based key-insulated aggregate signatures, revisited / Nobuaki Kitajima, Naoto Yanai, and Takashi Nishide
  • A new constant-size accountable ring signature scheme without random oracles / Sudhakar Kumawat and Souradyuti Paul
  • A universal designated multi-verifier transitive signature scheme / Fei Zhu, Yuexin Zhang, Chao Lin, Wei Wu, and Ru Meng
  • Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme / Xiaodong Yang, Ping Yang, Faying An, Shudong Li, Caifen Wang, and Dengguo Feng
  • Encryption ; Parallel long messages encryption scheme based on certificateless cryptosystem for big data / Xuguang Wu, Yiliang Han, Minqing Zhang, and Shuaishuai Zhu
  • Constant decryption-cost non-monotonic ciphertext policy attribute-based encryption with reduced secret key size (and dynamic attributes) / Geng Wang, Xiao Zhang, and Yanmei Li
  • Fully homomorphic encryption scheme based on public key compression and batch processing / Liquan Chen, Ming Lim, and Muyang Wang
  • Leveled FHE with matrix message space / Biao Wang, Xueqing Wang, and Rui Xue
  • Predicate fully homomorphic encryption: achieving fine-grained access control over manipulable ciphertext / Hanwen Feng, Jianwei Liu, Qianhong Wu, and Weiran Liu.
  • Cryptanalysis and attack ; NativeSpeaker : identifying crypto misuses in Android native code libraries / Qing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li, and Dawu Gu
  • A game-based framework towards cyber-attacks on state estimation in ICSs / Cong Chen, Dongdai Lin, Wei Zhang, and Xiaojun Zhou
  • Cryptanalysis of Acorn in nonce-reuse setting / Xiaojuan Zhang and Dongdai Lin
  • An improved method to unveil malware's hidden behavior / Qiang Li, Yunan Zhang, Liya Su, Yang Wu, Xinjian Ma, and Zeming Yang
  • BotTokenizer : exploring network tokens of HTTP-based botnet using malicious network traces / Biao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, and Jianguo Jiang
  • Improved cryptanalysis of an ISO standard lightweight block cipher with refined MILP modelling / Jun Yin, Chuyan Ma, Lijun Lyu, Jian Song, Guang Zeng, Chuangui Ma, and Fushan Wei
  • Meet in the middle attack on type-1 Feistel construction / Yuanhao Deng, Chenhui Jin, and Rongjia Li
  • Applications ; Influence of error on Hamming weights for ASCA / Chujiao Ma, John Chandy, Laurent Michel, Fanghui Liu, and Waldemar Cruz
  • State-of-the-art : security competition in talent education / Xiu Zhang, Baoxu Liu, Xiaorui Gong, and Zhenyu Song
  • A modified fuzzy fingerprint vault based on pair-polar minutiae structures / Xiangmin Li, Ning Ding, Haining Lu, Dawu Gu, Shanshan Wang, Beibei Xu, Yuan Yuan, and Siyun Yan
  • NOR : towards non-intrusive, real-time and OS-agnostic introspection for virtual machines in cloud environment / Chonghua Wang, Zhiyu Hao, and Xiaochun Yun
  • A method to enlarge the design distance of BCH codes and some classes of infinite optimal cyclic codes / Shanding Xu, Xiwang Cao, and Chunming Tang.