© 2018

Security and Cryptography for Networks

11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings

  • Dario Catalano
  • Roberto De Prisco
Conference proceedings SCN 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11035)

Also part of the Security and Cryptology book sub series (LNSC, volume 11035)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Signatures and Watermarking

    1. Front Matter
      Pages 1-1
    2. Masayuki Abe, Miguel Ambrona, Miyako Ohkubo, Mehdi Tibouchi
      Pages 3-22
    3. Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
      Pages 23-42
    4. Dario Fiore, Elena Pagnin
      Pages 43-62
    5. Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu
      Pages 63-80
  3. Composability

    1. Front Matter
      Pages 81-81
    2. Christian Badertscher, Fabio Banfi, Ueli Maurer
      Pages 102-120
  4. Encryption I

    1. Front Matter
      Pages 121-121
    2. Romain Gay, Lucas Kowalczyk, Hoeteck Wee
      Pages 123-139
    3. Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
      Pages 140-159
    4. Jung Hee Cheon, Duhyeong Kim, Joohee Lee, Yongsoo Song
      Pages 160-177
  5. Multiparty Computation

    1. Front Matter
      Pages 179-179
    2. Marcel Keller, Dragos Rotaru, Nigel P. Smart, Tim Wood
      Pages 181-199
    3. Karim Eldefrawy, Rafail Ostrovsky, Sunoo Park, Moti Yung
      Pages 200-215
    4. Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
      Pages 216-234
  6. Anonymity and Zero Knowledge

    1. Front Matter
      Pages 253-253
    2. Adam L. Young, Moti Yung
      Pages 255-273

About these proceedings


This book constitutes the proceedings of the 11th International Conference on Security and Cryptography for Networks, SCN 2018, held in Amalfi, Italy, in September 2018.

The 30 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on signatures and watermarking; composability; encryption; multiparty computation; anonymity and zero knowledge; secret sharing and oblivious transfer; lattices and post quantum cryptography; obfuscation; two-party computation; and protocols.


authentication ciphertexts communication channels in information theory computer crime cryptographic protocols cryptography data encryption data mining data privacy data security digital signature electronic document identification systems network security PK privacy preserving project management public key cryptography Public Keys software engineering structural design

Editors and affiliations

  • Dario Catalano
    • 1
  • Roberto De Prisco
    • 2
  1. 1.University of CataniaCataniaItaly
  2. 2.University of SalernoFiscianoItaly

Bibliographic information