Skip to main content
  • Conference proceedings
  • © 2022

Applied Cryptography and Network Security

20th International Conference, ACNS 2022, Rome, Italy, June 20–23, 2022, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13269)

Conference series link(s): ACNS: International Conference on Applied Cryptography and Network Security

Conference proceedings info: ACNS 2022.

Buying options

eBook USD 99.00
Price excludes VAT (USA)
  • ISBN: 978-3-031-09234-3
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 129.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (44 papers)

  1. Front Matter

    Pages i-xv
  2. Encryption

    1. Front Matter

      Pages 1-1
    2. Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation

      • Shingo Sato, Keita Emura, Atsushi Takayasu
      Pages 3-23
    3. A Performance Evaluation of Pairing-Based Broadcast Encryption Systems

      • Arush Chhatrapati, Susan Hohenberger, James Trombo, Satyanarayana Vusirikala
      Pages 24-44
    4. An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile

      • Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang
      Pages 45-64
  3. Attacks

    1. Front Matter

      Pages 65-65
    2. Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle

      • Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu
      Pages 67-84
    3. ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes

      • Narmeen Shafqat, Daniel J. Dubois, David Choffnes, Aaron Schulman, Dinesh Bharadia, Aanjhan Ranganathan
      Pages 105-125
    4. Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes

      • Marco Dijkslag, Marc Damie, Florian Hahn, Andreas Peter
      Pages 126-146
    5. Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge

      • Herson Esquivel-Vargas, John Henry Castellanos, Marco Caselli, Nils Ole Tippenhauer, Andreas Peter
      Pages 170-192
    6. RSA Key Recovery from Digit Equivalence Information

      • Chitchanok Chuengsatiansup, Andrew Feutrill, Rui Qi Sim, Yuval Yarom
      Pages 193-211
    7. Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges

      • Hosein Hadipour, Maria Eichlseder
      Pages 230-250
  4. Cryptographic Protocols

    1. Front Matter

      Pages 251-251
    2. KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip

      • Felix Günther, Simon Rastikian, Patrick Towa, Thom Wiggers
      Pages 253-272
    3. Improving the Privacy of Tor Onion Services

      • Edward Eaton, Sajin Sasy, Ian Goldberg
      Pages 273-292

Other Volumes

  1. Applied Cryptography and Network Security

    20th International Conference, ACNS 2022, Rome, Italy, June 20–23, 2022, Proceedings
  2. Applied Cryptography and Network Security Workshops

    ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20–23, 2022, Proceedings

About this book

The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022.

 

The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 185 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography.

Keywords

  • artificial intelligence
  • authentication
  • computer hardware
  • computer networks
  • computer science
  • computer security
  • computer systems
  • cryptography
  • data security
  • distributed computer systems
  • distributed systems
  • engineering
  • internet
  • mathematics
  • network protocols
  • network security
  • parallel processing systems
  • privacy
  • public key cryptography
  • signal processing

Editors and Affiliations

  • Stevens Institute of Technology, Hoboken, USA

    Giuseppe Ateniese

  • Sapienza University of Rome, Rome, Italy

    Daniele Venturi

Bibliographic Information

Buying options

eBook USD 99.00
Price excludes VAT (USA)
  • ISBN: 978-3-031-09234-3
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 129.99
Price excludes VAT (USA)