Applied Cryptography and Network Security

11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings

  • Michael Jacobson
  • Michael Locasto
  • Payman Mohassel
  • Reihaneh Safavi-Naini
Conference proceedings ACNS 2013

DOI: 10.1007/978-3-642-38980-1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7954)

Table of contents (35 papers)

  1. Front Matter
  2. Cloud Cryptography

    1. Client-Controlled Cryptography-as-a-Service in the Cloud
      Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi
      Pages 19-36
    2. CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing
      Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou
      Pages 37-52
    3. Computing on Authenticated Data for Adjustable Predicates
      Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein
      Pages 53-68
  3. Secure Computation

    1. Towards Efficient Private Distributed Computation on Unbounded Input Streams
      Shlomi Dolev, Juan Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky
      Pages 69-83
    2. From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting
      Sven Laur, Riivo Talviste, Jan Willemson
      Pages 84-101
    3. Private Database Queries Using Somewhat Homomorphic Encryption
      Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu
      Pages 102-118
  4. Hash Function and Block Cipher

    1. BLAKE2: Simpler, Smaller, Fast as MD5
      Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O’Hearn, Christian Winnerlein
      Pages 119-135
  5. Signature

    1. Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles
      Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng
      Pages 186-201
    2. Sequential Aggregate Signatures Made Shorter
      Kwangsu Lee, Dong Hoon Lee, Moti Yung
      Pages 202-217
  6. Group-Oriented Cryptography

    1. How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE
      Rikke Bendlin, Sara Krehbiel, Chris Peikert
      Pages 218-236
    2. Toward Practical Group Encryption
      Laila El Aimani, Marc Joye
      Pages 237-252
  7. System Attack I

    1. Experimental Analysis of Attacks on Next Generation Air Traffic Communication
      Matthias Schäfer, Vincent Lenders, Ivan Martinovic
      Pages 253-271
    2. Launching Generic Attacks on iOS with Approved Third-Party Applications
      Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert Deng, Debin Gao et al.
      Pages 272-289
  8. Secure Implementation – Hardware

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems.

Keywords

authentication cloud computing data structures protocols spam detection

Editors and affiliations

  • Michael Jacobson
    • 1
  • Michael Locasto
    • 1
  • Payman Mohassel
    • 1
  • Reihaneh Safavi-Naini
    • 1
  1. 1.University of CalgaryCanada

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-38979-5
  • Online ISBN 978-3-642-38980-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349