International Conference on Applied Cryptography and Network Security

Applied Cryptography and Network Security

13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers

  • Tal Malkin
  • Vladimir Kolesnikov
  • Allison Bishop Lewko
  • Michalis Polychronakis

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9092)

Also part of the Security and Cryptology book sub series (LNSC, volume 9092)

Table of contents

  1. Front Matter
    Pages I-XVIII
  2. Secure Computation I: Primitives and New Models

    1. Front Matter
      Pages 1-1
    2. Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
      Pages 23-41
  3. Public Key Cryptographic Primitives

    1. Front Matter
      Pages 63-63
    2. Olivier Blazy, Céline Chevalier
      Pages 65-86
    3. Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen
      Pages 87-104
    4. Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki
      Pages 105-126
  4. Secure Computation II: Applications

    1. Front Matter
      Pages 147-147
    2. Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
      Pages 149-171
    3. Craig Gentry, Shai Halevi, Charanjit Jutla, Mariana Raykova
      Pages 172-191
    4. Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama
      Pages 192-214
    5. Weiyu Jiang, Jingqiang Lin, Zhan Wang, Huorong Li, Lei Wang
      Pages 215-239
  5. Anonymity and Related Applications

    1. Front Matter
      Pages 241-241
    2. Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik
      Pages 243-262
    3. Satrajit Ghosh, Aniket Kate
      Pages 263-286
    4. Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
      Pages 287-306
    5. Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven
      Pages 307-327

About these proceedings


This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement;  authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.


Applied Cryptography Network Security privacy anonymity outsourced computation digital currencies provably secure protocols impossibility results attacks industrial challenges case studies big data hardware security new paradigms non-traditional perspectives privacy metrics public key cryptography security security metrics symmetric key cryptography

Editors and affiliations

  • Tal Malkin
    • 1
  • Vladimir Kolesnikov
    • 2
  • Allison Bishop Lewko
    • 3
  • Michalis Polychronakis
    • 4
  1. 1.Columbia UniversityNew YorkUSA
  2. 2.Bell LabsMurray HillUSA
  3. 3.Columbia UniversityNew YorkUSA
  4. 4.Stony Brook UniversityStony BrookUSA

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-28165-0
  • Online ISBN 978-3-319-28166-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book