Information Security and Privacy

20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings

  • Ernest Foo
  • Douglas Stebila

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9144)

Also part of the Security and Cryptology book sub series (LNSC, volume 9144)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Symmetric Cryptanalysis

    1. Front Matter
      Pages 1-1
    2. Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li
      Pages 20-38
    3. Biaoshuai Tao, Hongjun Wu
      Pages 39-56
  3. Public Key Cryptography

    1. Front Matter
      Pages 57-57
    2. Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang
      Pages 59-76
    3. Yusuke Sakai, Keita Emura, Jacob C.N. Schuldt, Goichiro Hanaoka, Kazuo Ohta
      Pages 77-92
    4. Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya
      Pages 93-106
    5. Christophe Negre, Guilherme Perin
      Pages 107-124
  4. Identity-Based Encryption

    1. Front Matter
      Pages 125-125
    2. Kaoru Kurosawa, Le Trieu Phong
      Pages 145-159
    3. Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo
      Pages 160-173
    4. Yuu Ishida, Yohei Watanabe, Junji Shikata
      Pages 174-191
  5. Digital Signatures

    1. Front Matter
      Pages 193-193
    2. Priyanka Bose, Dipanjan Das, Chandrasekharan Pandu Rangan
      Pages 230-247
  6. Security Protocols

    1. Front Matter
      Pages 249-249

About these proceedings


This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015.

The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.


Cloud storage Cryptanalysis Cryptographic module Cryptographic protocols Cryptography Data integrity Digital signatures Hash functions Hybrid encryption Identity-based encryption Information security Message authentication Privacy Privacy preserving Public key encryption RSA Symmetric encryption Zero-knowledge

Editors and affiliations

  • Ernest Foo
    • 1
  • Douglas Stebila
    • 2
  1. 1.Queensland University of TechnologyBrisbaneAustralia
  2. 2.Queensland University of TechnologyBrisbaneAustralia

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-19961-0
  • Online ISBN 978-3-319-19962-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book