© 2018

Cryptology and Network Security

16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papers

  • Srdjan Capkun
  • Sherman S. M. Chow
Conference proceedings CANS 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11261)

Also part of the Security and Cryptology book sub series (LNSC, volume 11261)

Table of contents

  1. Front Matter
    Pages I-XVII
  2. Foundation of Applied Cryptography

    1. Front Matter
      Pages 1-1
    2. Mihir Bellare, Adam O’Neill, Igors Stepanovs
      Pages 3-26
    3. José Becerra, Vincenzo Iovino, Dimiter Ostrev, Petra Šala, Marjan Škrobot
      Pages 27-48
  3. Processing Encrypted Data

    1. Front Matter
      Pages 49-49
    2. Matteo Maffei, Manuel Reinert, Dominique Schröder
      Pages 51-70
    3. Daniel Demmler, Kay Hamacher, Thomas Schneider, Sebastian Stammler
      Pages 71-92
    4. Lihua Wang, Yoshinori Aono, Le Trieu Phong
      Pages 93-111
  4. Predicate Encryption

    1. Front Matter
      Pages 113-113
    2. Jonathan Katz, Matteo Maffei, Giulio Malavolta, Dominique Schröder
      Pages 115-134
    3. Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker
      Pages 135-157
  5. Credentials and Authentication

    1. Front Matter
      Pages 159-159
    2. Elena Pagnin, Jing Liu, Aikaterini Mitrokotsa
      Pages 161-178
    3. Stephan Krenn, Thomas Lorünser, Anja Salzer, Christoph Striecks
      Pages 179-202
  6. Web Security

    1. Front Matter
      Pages 227-227
    2. Marcus Niemietz, Jörg Schwenk
      Pages 229-249
    3. Daniele E. Asoni, Samuel Hitz, Adrian Perrig
      Pages 250-273
  7. Bitcoin and Blockchain

    1. Front Matter
      Pages 275-275
    2. Indra Deep Mastan, Souradyuti Paul
      Pages 277-298

About these proceedings


This book contains revised versions of all the papers presented at the 16th International Conference on Cryptology and Network Security, CANS 2017, held in Hong Kong, China, in November/ December 2017.

The 20 full papers presented together with 8 short papers were carefully reviewed and selected from 88 submissions. The full papers are organized in the following topical sections: foundation of applied cryptography; processing encrypted data; predicate encryption; credentials and authentication; web security; Bitcoin and blockchain; embedded system security; anonymous and virtual private networks; and wireless and physical layer security.


access control anonymous networks authentication Bitcoin cryptography data mining data privacy data security electronic document identification systems encryption internet privacy privacy preserving protocols public key cryptography random oracle model signature virtual private networks Web security wireless telecommunication systems World Wide Web

Editors and affiliations

  1. 1.ETH ZürichZürichSwitzerland
  2. 2.Chinese University of Hong KongShatinHong Kong

Bibliographic information