Skip to main content
  • Conference proceedings
  • © 2015

Applied Cryptography and Network Security

13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9092)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACNS: International Conference on Applied Cryptography and Network Security

Conference proceedings info: ACNS 2015.

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-28166-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 109.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (33 papers)

  1. Front Matter

    Pages I-XVIII
  2. Secure Computation I: Primitives and New Models

    1. Front Matter

      Pages 1-1
    2. Communication-Optimal Proactive Secret Sharing for Dynamic Groups

      • Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
      Pages 23-41
  3. Public Key Cryptographic Primitives

    1. Front Matter

      Pages 63-63
    2. Generic Construction of UC-Secure Oblivious Transfer

      • Olivier Blazy, Céline Chevalier
      Pages 65-86
    3. Non-malleability Under Selective Opening Attacks: Implication and Separation

      • Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen
      Pages 87-104
    4. A Signature Scheme with a Fuzzy Private Key

      • Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki
      Pages 105-126
  4. Secure Computation II: Applications

    1. Front Matter

      Pages 147-147
    2. Zero-Knowledge Authenticated Order Queries and Order Statistics on a List

      • Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
      Pages 149-171
    3. Private Database Access with HE-over-ORAM Architecture

      • Craig Gentry, Shai Halevi, Charanjit Jutla, Mariana Raykova
      Pages 172-191
    4. Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures

      • Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama
      Pages 192-214
    5. LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data

      • Weiyu Jiang, Jingqiang Lin, Zhan Wang, Huorong Li, Lei Wang
      Pages 215-239
  5. Anonymity and Related Applications

    1. Front Matter

      Pages 241-241
    2. Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking

      • Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik
      Pages 243-262
    3. Post-Quantum Forward-Secure Onion Routing

      • Satrajit Ghosh, Aniket Kate
      Pages 263-286
    4. Scalable Divisible E-cash

      • Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
      Pages 287-306
    5. Recovering Lost Device-Bound Credentials

      • Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven
      Pages 307-327

Other Volumes

  1. Applied Cryptography and Network Security

    13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers

About this book

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement;  authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.

Keywords

  • Applied Cryptography
  • Network Security
  • privacy
  • anonymity
  • outsourced computation
  • digital currencies
  • provably secure protocols
  • impossibility results
  • attacks
  • industrial challenges
  • case studies
  • big data
  • hardware security
  • new paradigms
  • non-traditional perspectives
  • privacy metrics
  • public key cryptography
  • security
  • security metrics
  • symmetric key cryptography

Editors and Affiliations

  • Columbia University, New York, USA

    Tal Malkin, Allison Bishop Lewko

  • Bell Labs, Murray Hill, USA

    Vladimir Kolesnikov

  • Stony Brook University, Stony Brook, USA

    Michalis Polychronakis

Bibliographic Information

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-28166-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 109.99
Price excludes VAT (USA)