Skip to main content
  • Conference proceedings
  • © 2008

Cryptology and Network Security

7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5339)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CANS: International Conference on Cryptology and Network Security

Conference proceedings info: CANS 2008.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (27 papers)

  1. Front Matter

  2. Cryptosystems

    1. Chosen-Ciphertext Secure Proxy Re-encryption without Pairings

      • Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
      Pages 1-17
    2. Hybrid Damgård Is CCA1-Secure under the DDH Assumption

      • Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan
      Pages 18-30
    3. Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption

      • Masafumi Kusakawa, Harunaga Hiwatari, Tomoyuki Asano, Seiichi Matsuda
      Pages 31-48
    4. Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits

      • Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang
      Pages 49-63
  3. Signatures

    1. Efficient and Short Certificateless Signature

      • Raylin Tso, Xun Yi, Xinyi Huang
      Pages 64-79
    2. Sanitizable Signatures Revisited

      • Tsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu
      Pages 80-97
    3. On the Security of Online/Offline Signatures and Multisignatures from ACISP’06

      • Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
      Pages 108-119
  4. Identification, Authentication and Key Management

    1. Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange

      • Michel Abdalla, Malika Izabachène, David Pointcheval
      Pages 133-148
    2. Cryptanalysis of EC-RAC, a RFID Identification Protocol

      • Julien Bringer, Hervé Chabanne, Thomas Icart
      Pages 149-161
  5. Cryptographic Algorithms and Protocols

    1. Counting Method for Multi-party Computation over Non-abelian Groups

      • Youming Qiao, Christophe Tartary
      Pages 162-177
    2. Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes

      • Tiancheng Lou, Christophe Tartary
      Pages 196-213
    3. Skew Frobenius Map and Efficient Scalar Multiplication for Pairing–Based Cryptography

      • Yumi Sakemi, Yasuyuki Nogami, Katsuyuki Okeya, Hidehiro Kato, Yoshitaka Morikawa
      Pages 226-239
  6. Stream Ciphers and Block Ciphers

    1. Cryptanalysis of MV3 Stream Cipher

      • Mohammad Ali Orumiehchi, S. Fahimeh Mohebbipoor, Hossein Ghodosi
      Pages 240-251
    2. 3D: A Three-Dimensional Block Cipher

      • Jorge Nakahara Jr.
      Pages 252-267
  7. Cryptographic Foundations

Other Volumes

  1. Cryptology and Network Security

About this book

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS 2008, held in Hong-Kong, China, in December 2008. The 27 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are organized in topical sections on cryptosystems, signatures, identification, authentication and key management, cryptographic algorithms and protocols, stream ciphers and block ciphers, cryptographic foundations, applications and implementations, as well as security in ad hoc networks and wireless sensor networks.

Keywords

  • AES
  • DoS attacks
  • ad hoc networks
  • anonymity
  • authentication
  • block ciphers
  • cryptanalysis
  • cryptographic protocols
  • cryptography
  • digital signature
  • elliptic curve cryptography
  • encryption
  • group signatures
  • network security
  • security
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Department of Computer Science, University of California, Davis, USA

    Matthew K. Franklin

  • Department of Computer Science, The University of Hong Kong, Hong Kong, China

    Lucas Chi Kwong Hui

  • Department of Computer Science, City University of Hong Kong, Hong Kong, Hong Kong

    Duncan S. Wong

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions