Information Security and Cryptology

4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers

  • Moti Yung
  • Peng Liu
  • Dongdai Lin
Conference proceedings Inscrypt 2008

DOI: 10.1007/978-3-642-01440-6

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5487)

Table of contents (31 papers)

  1. Front Matter
  2. Invited Talks

    1. Key Evolution Systems in Untrusted Update Environments
      Benoît Libert, Jean-Jacques Quisquater, Moti Yung
      Pages 12-21
  3. Digital Signature and Signcryption Schemes

    1. Provably Secure Convertible Nominative Signature Scheme
      Wei Zhao, Changlu Lin, Dingfeng Ye
      Pages 23-40
    2. Cryptanalysis of Two Ring Signcryption Schemes
      Huaqun Wang, Hong Yu
      Pages 41-46
    3. Efficient Signcryption Key Encapsulation without Random Oracles
      Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
      Pages 47-59
  4. Privacy and Anonymity

    1. Strong Anonymous Signatures
      Rui Zhang, Hideki Imai
      Pages 60-71
    2. Publicly Verifiable Privacy-Preserving Group Decryption
      Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
      Pages 72-83
    3. Privacy for Private Key in Signatures
      Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
      Pages 84-95
  5. Message Authentication Code and Hash Function

    1. Security of Truncated MACs
      Peng Wang, Dengguo Feng, Changlu Lin, Wenling Wu
      Pages 96-114
    2. Security Analysis of Multivariate Polynomials for Hashing
      Luk Bettale, Jean-Charles Faugère, Ludovic Perret
      Pages 115-124
  6. Secure Protocols

    1. Batch ZK Proof and Verification of OR Logic
      Kun Peng, Feng Bao
      Pages 141-156
  7. Symmetric Cryptography

    1. Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs
      Debra L. Cook, Moti Yung, Angelos Keromytis
      Pages 157-180
    2. Impossible Differential Analysis of Reduced Round CLEFIA
      Wenying Zhang, Jing Han
      Pages 181-191
    3. Reducible Polynomial over \(\mathbb{F}_{2}\) Constructed by Trinomial σ−LFSR
      Guang Zeng, Yang Yang, Wenbao Han, Shuqin Fan
      Pages 192-200
  8. Certificateless Cryptography

    1. Further Observations on Certificateless Public Key Encryption
      Xu an Wang, Xinyi Huang, Xiaoyuan Yang
      Pages 217-239
  9. Hardware Implementation and Side Channel Attack

    1. Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing
      Mooseop Kim, Jaecheol Ryou, Sungik Jun
      Pages 240-252

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008.

The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on digital signature and signcryption schemes, privacy and anonymity, message authentication code and hash function, secure protocols, symmetric cryptography, certificateless cryptography, hardware implementation and side channel attack, wireless network security, public key and identity based cryptography, access control and network security, as well as trusted computing and applications.


Public Key Trusted Computing anonymity code cryptography data security identity information privacy security trust

Editors and affiliations

  • Moti Yung
    • 1
  • Peng Liu
    • 2
  • Dongdai Lin
    • 3
  1. 1.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew York, NYUSA
  2. 2.College of Information Sciences and TechnologyPennsylvania State UniversityUniversity ParkUSA
  3. 3.SKLOIS, Institute of SoftwareChinese Academy of SciencesBeijingChina

Bibliographic information

  • Copyright Information Springer Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-01439-0
  • Online ISBN 978-3-642-01440-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349