Skip to main content
  • Conference proceedings
  • © 2012

Security and Cryptography for Networks

8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012, Proceedings

Editors:

(view affiliations)
  • Up-to-date results

  • Fast-track conference proceedings

  • State-of-the-art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7485)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): SCN: International Conference on Security and Cryptography for Networks

Conference proceedings info: SCN 2012.

Buying options

eBook
USD 64.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-32928-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD 84.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (31 papers)

  1. Front Matter

  2. Cryptography from Lattices

    1. Ring Switching in BGV-Style Homomorphic Encryption

      • Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart
      Pages 19-37
    2. Fully Anonymous Attribute Tokens from Lattices

      • Jan Camenisch, Gregory Neven, Markus Rückert
      Pages 57-75
  3. Signature Schemes

    1. Efficient Structure-Preserving Signature Scheme from Standard Assumptions

      • Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev
      Pages 76-94
    2. Compact Round-Optimal Partially-Blind Signatures

      • Olivier Blazy, David Pointcheval, Damien Vergnaud
      Pages 95-112
    3. History-Free Sequential Aggregate Signatures

      • Marc Fischlin, Anja Lehmann, Dominique Schröder
      Pages 113-130
  4. Encryption Schemes I

    1. Decentralized Dynamic Broadcast Encryption

      • Duong Hieu Phan, David Pointcheval, Mario Strefler
      Pages 166-183
    2. Time-Specific Encryption from Forward-Secure Encryption

      • Kohei Kasamatsu, Takahiro Matsuda, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai
      Pages 184-204
  5. Efficient Two-Party and Multi-Party Computation

    1. Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits

      • Vladimir Kolesnikov, Ranjit Kumaresan
      Pages 205-221
    2. 5PM: Secure Pattern Matching

      • Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler
      Pages 222-240
    3. Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol

      • Ivan Damgård, Marcel Keller, Enrique Larraia, Christian Miles, Nigel P. Smart
      Pages 241-263
  6. Security in the UC Framework

    1. On the Centrality of Off-Line E-Cash to Concrete Partial Information Games

      • Seung Geol Choi, Dana Dachman-Soled, Moti Yung
      Pages 264-280
    2. Universally Composable Security with Local Adversaries

      • Ran Canetti, Margarita Vald
      Pages 281-301
  7. Cryptanalysis

    1. On the Strength Comparison of the ECDLP and the IFP

      • Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Tetsuya Izu
      Pages 302-325
    2. New Attacks for Knapsack Based Cryptosystems

      • Gottfried Herold, Alexander Meurer
      Pages 326-342
    3. Multiple Differential Cryptanalysis Using LLR and χ 2 Statistics

      • Céline Blondeau, Benoît Gérard, Kaisa Nyberg
      Pages 343-360

Other Volumes

  1. Security and Cryptography for Networks

    8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings

About this book

This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012.

The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners.

Keywords

  • homomorphic encryption
  • multiple differential cryptanalysis
  • public key encryption
  • secure computation
  • structure-preserving signatures

Editors and Affiliations

  • Dipartimento di Informatica, Università di Salerno, Fisciano, Italy

    Ivan Visconti, Roberto Prisco

Bibliographic Information

Buying options

eBook
USD 64.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-32928-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD 84.99
Price excludes VAT (USA)