Advertisement

Security and Cryptography for Networks

10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings

  • Vassilis Zikas
  • Roberto De Prisco
Conference proceedings SCN 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9841)

Also part of the Security and Cryptology book sub series (LNSC, volume 9841)

Table of contents

  1. Front Matter
    Pages I-XIX
  2. Encryption

    1. Front Matter
      Pages 1-1
    2. Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au
      Pages 3-22
    3. Jie Chen, Benoît Libert, Somindu C. Ramanna
      Pages 23-41
    4. Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada
      Pages 42-61
    5. Silvio Biagioni, Daniel Masny, Daniele Venturi
      Pages 62-80
  3. Memory Protection

    1. Front Matter
      Pages 81-81
    2. Alexandra Boldyreva, Taesoo Kim, Richard Lipton, Bogdan Warinschi
      Pages 83-103
    3. Jan Camenisch, Robert R. Enderlein, Ueli Maurer
      Pages 104-125
  4. Multi-party Computation

    1. Front Matter
      Pages 127-127
    2. Ran Cohen, Chris Peikert
      Pages 129-146
    3. Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
      Pages 147-168
    4. Brett Hemenway, Steve Lu, Rafail Ostrovsky, William Welser IV
      Pages 169-187
  5. Zero-Knowledge Proofs

    1. Front Matter
      Pages 189-189
    2. Arno Mittelbach, Daniele Venturi
      Pages 198-215
    3. Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia
      Pages 216-236
    4. Yi Deng, Juan Garay, San Ling, Huaxiong Wang, Moti Yung
      Pages 237-253
  6. Efficient Protocols

    1. Front Matter
      Pages 255-255
    2. Rafael del Pino, Vadim Lyubashevsky, David Pointcheval
      Pages 273-291
    3. Leonid Reyzin, Sophia Yakoubov
      Pages 292-309
  7. Outsourcing Computation

    1. Front Matter
      Pages 311-311
    2. Carmit Hazay, Hila Zarosim
      Pages 313-332
    3. Dario Catalano, Mario Di Raimondo, Simone Faro
      Pages 333-350
  8. Digital Signatures

    1. Front Matter
      Pages 351-351
    2. Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin
      Pages 353-371
    3. Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
      Pages 372-390
    4. Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig
      Pages 391-408
  9. Cryptanalysis

    1. Front Matter
      Pages 409-409
    2. Chris Peikert
      Pages 411-430
  10. Two-party Computation

    1. Front Matter
      Pages 447-447
    2. Tatiana Bradley, Sky Faber, Gene Tsudik
      Pages 449-467
    3. Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
      Pages 486-505
  11. Secret Sharing

    1. Front Matter
      Pages 507-507
    2. Amos Beimel, Oriol Farràs, Naty Peter
      Pages 509-528
    3. Shlomi Dolev, Karim ElDefrawy, Joshua Lampkins, Rafail Ostrovsky, Moti Yung
      Pages 529-548
  12. Obfuscation

    1. Front Matter
      Pages 549-549
    2. Zvika Brakerski, Or Dagmi
      Pages 551-570
    3. Antonio Marcedone, Rafael Pass, Abhi Shelat
      Pages 571-586
    4. Matthew D. Green, Jonathan Katz, Alex J. Malozemoff, Hong-Sheng Zhou
      Pages 587-603
  13. Back Matter
    Pages 605-606

About these proceedings

Introduction

This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016.

The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. They are organized in topical sections on encryption; memory protection; multi-party computation; zero-knowledge proofs; efficient protocols; outsourcing computation; digital signatures; cryptanalysis; two-party computation; secret sharing; and obfuscation.

Keywords

authentication data encryption formal methods and theory of security network security secure multiparty computation adaptive security cryptographic primitives cryptographic protocols fuzzy search oblivious transfer password-based authentication privacy-preserving protocols secret sharing security and privacy security protocols side-channel attack signature schemes spatial encryption symmetric encryption

Editors and affiliations

  • Vassilis Zikas
    • 1
  • Roberto De Prisco
    • 2
  1. 1.Rensselaer Polytechnic InstituteTroyUSA
  2. 2.University of SalernoFiscianoItaly

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-44618-9
  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-44617-2
  • Online ISBN 978-3-319-44618-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site