Skip to main content
  • Conference proceedings
  • © 2020

Applied Cryptography and Network Security

18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12146)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACNS: International Conference on Applied Cryptography and Network Security

Conference proceedings info: ACNS 2020.

Buying options

eBook USD 69.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-57808-4
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 89.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (24 papers)

  1. Front Matter

    Pages i-xix
  2. Cryptographic Protocols

    1. Front Matter

      Pages 1-1
    2. Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities

      • Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux
      Pages 3-23
    3. Random Walks and Concurrent Zero-Knowledge

      • Anand Aiyer, Xiao Liang, Nilu Nalini, Omkant Pandey
      Pages 24-44
    4. Secure and Efficient Delegation of Elliptic-Curve Pairing

      • Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain
      Pages 45-66
  3. Cryptographic Primitives

    1. Front Matter

      Pages 67-67
    2. Tweaking Key-Alternating Feistel Block Ciphers

      • Hailun Yan, Lei Wang, Yaobin Shen, Xuejia Lai
      Pages 69-88
    3. Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode

      • Shoichi Hirose, Yu Sasaki, Hirotaka Yoshida
      Pages 89-109
    4. Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model

      • Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk
      Pages 130-149
  4. Attacks on Cryptographic Primitives

    1. Front Matter

      Pages 151-151
    2. Rotational Cryptanalysis on MAC Algorithm Chaskey

      • Liliya Kraleva, Tomer Ashur, Vincent Rijmen
      Pages 153-168
    3. How Not to Create an Isogeny-Based PAKE

      • Reza Azarderakhsh, David Jao, Brian Koziel, Jason T. LeGrow, Vladimir Soukharev, Oleg Taraskin
      Pages 169-186
    4. ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files?

      • Rintaro Fujita, Takanori Isobe, Kazuhiko Minematsu
      Pages 187-207
    5. Classical Misuse Attacks on NIST Round 2 PQC

      • Loïs Huguenin-Dumittan, Serge Vaudenay
      Pages 208-227
  5. Encryption and Signature

    1. Front Matter

      Pages 229-229
    2. Offline Witness Encryption with Semi-adaptive Security

      • Peter Chvojka, Tibor Jager, Saqib A. Kakvi
      Pages 231-250
    3. Efficient Anonymous Multi-group Broadcast Encryption

      • Intae Kim, Seong Oun Hwang, Willy Susilo, Joonsang Baek, Jongkil Kim
      Pages 251-270
    4. New Methods and Abstractions for RSA-Based Forward Secure Signatures

      • Susan Hohenberger, Brent Waters
      Pages 292-312

Other Volumes

  1. Applied Cryptography and Network Security

    18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I
  2. Applied Cryptography and Network Security

    18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II
  3. Applied Cryptography and Network Security Workshops

    ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings

About this book

This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually due to the COVID-19 pandemic.

 The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.

Keywords

  • access control
  • authentication
  • communication
  • computer hardware
  • computer networks
  • computer science
  • computer security
  • computer systems
  • cryptography
  • data security
  • encryption
  • engineering
  • internet
  • mathematics
  • network protocols
  • network security
  • privacy
  • public key cryptography
  • signal processing
  • telecommunication systems

Editors and Affiliations

  • Department of Mathematics, University of Padua, Padua, Italy

    Mauro Conti

  • Singapore University of Technology and Design, Singapore, Singapore

    Jianying Zhou

  • Dipt di Informatica Sistemi e Produ, Università di Roma “Tor Vergata”, Rome, Italy

    Emiliano Casalicchio

  • Sapienza University of Rome, Rome, Italy

    Angelo Spognardi

Bibliographic Information

Buying options

eBook USD 69.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-57808-4
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 89.99
Price excludes VAT (USA)