Information Security and Privacy

20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings

  • Ernest Foo
  • Douglas Stebila
Conference proceedings ACISP 2015

DOI: 10.1007/978-3-319-19962-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9144)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Symmetric Cryptanalysis

    1. Front Matter
      Pages 1-1
    2. Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
      Pages 20-38
    3. Biaoshuai Tao, Hongjun Wu
      Pages 39-56
  3. Public Key Cryptography

    1. Front Matter
      Pages 57-57
    2. Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang
      Pages 59-76
    3. Yusuke Sakai, Keita Emura, Jacob C.N. Schuldt, Goichiro Hanaoka, Kazuo Ohta
      Pages 77-92
    4. Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya
      Pages 93-106
    5. Christophe Negre, Guilherme Perin
      Pages 107-124
  4. Identity-Based Encryption

    1. Front Matter
      Pages 125-125
    2. Kaoru Kurosawa, Le Trieu Phong
      Pages 145-159
    3. Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo
      Pages 160-173
    4. Yuu Ishida, Yohei Watanabe, Junji Shikata
      Pages 174-191
  5. Digital Signatures

    1. Front Matter
      Pages 193-193
    2. Priyanka Bose, Dipanjan Das, Chandrasekharan Pandu Rangan
      Pages 230-247
  6. Security Protocols

    1. Front Matter
      Pages 249-249

About these proceedings


This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015.

The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.


Cloud storage Cryptanalysis Cryptographic module Cryptographic protocols Cryptography Data integrity Digital signatures Hash functions Hybrid encryption Identity-based encryption Information security Message authentication Privacy Privacy preserving Public key encryption RSA Symmetric encryption Zero-knowledge

Editors and affiliations

  • Ernest Foo
    • 1
  • Douglas Stebila
    • 2
  1. 1.Queensland University of TechnologyBrisbaneAustralia
  2. 2.Queensland University of TechnologyBrisbaneAustralia

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-19961-0
  • Online ISBN 978-3-319-19962-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349