Skip to main content
  • Conference proceedings
  • © 2005

Security in Communication Networks

4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3352)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): SCN: International Conference on Security and Cryptography for Networks

Conference proceedings info: SCN 2004.

Buying options

eBook USD 99.00
Price excludes VAT (USA)
  • ISBN: 978-3-540-30598-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 129.00
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (26 papers)

  1. Front Matter

  2. Reduction of Security/Primitives

    1. On the Security Notions for Public-Key Encryption Schemes

      • Duong Hieu Phan, David Pointcheval
      Pages 33-46
    2. Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel

      • Claude Crépeau, Kirill Morozov, Stefan Wolf
      Pages 47-59
  3. Signature Schemes

    1. A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs

      • Siamak Fayyaz Shahandashti, Mahmoud Salmasizadeh, Javad Mohajeri
      Pages 60-76
    2. Group Signatures with Separate and Distributed Authorities

      • Jun Furukawa, Shoko Yonezawa
      Pages 77-90
    3. Threshold Cryptography in Mobile Ad Hoc Networks

      • Giovanni Di Crescenzo, Gonzalo Arce, Renwei Ge
      Pages 91-104
  4. Anonymity and Privacy

    1. Group Signatures: Better Efficiency and New Theoretical Aspects

      • Jan Camenisch, Jens Groth
      Pages 120-133
    2. Efficient Blind Signatures Without Random Oracles

      • Jan Camenisch, Maciej Koprowski, Bodgan Warinschi
      Pages 134-148
  5. Authentication and Identification

    1. On the Key Exposure Problem in Chameleon Hashes

      • Giuseppe Ateniese, Breno de Medeiros
      Pages 165-179
  6. Zero Knowledge

    1. Identity-Based Zero-Knowledge

      • Jonathan Katz, Rafail Ostrovsky, Michael O. Rabin
      Pages 180-192
  7. Public Key Cryptosystems

    1. A Robust Multisignature Scheme with Applications to Acknowledgement Aggregation

      • Claude Castelluccia, Stanisław Jarecki, Jihye Kim, Gene Tsudik
      Pages 193-207
    2. Improved Signcryption from q-Diffie-Hellman Problems

      • Benoît Libert, Jean-Jacques Quisquater
      Pages 220-234
  8. Distributed Cryptography

    1. Colored Visual Cryptography Without Color Darkening

      • S. Cimato, R. De Prisco, A. De Santis
      Pages 235-248
    2. On the Size of Monotone Span Programs

      • Ventzislav Nikov, Svetla Nikova, Bart Preneel
      Pages 249-262

Other Volumes

  1. Security in Communication Networks

    4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers

About this book

The 4th International Conference on Security in Communication Networks 2004 (SCN2004)washeldatthe“DioceseHall”oftheArchdioceseofAmal?-Cavade’ Tirreni and the “Armorial Bearings Hall” of the Archbishop Palace in Amal?, Italy, on September 8–10, 2004. Previous conferences also took place in Amal? in 1996, 1999 and 2002. The conference aimed at bringing together researchers in the ?elds of cr- tography and security in communication networks to foster cooperation and the exchange of ideas. The main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- analysis, digital signatures, distributed cryptography, hash functions, identi?- tion,implementations,keydistribution,privacy,publickeyencryption,threshold cryptography, and zero knowledge. The Program Committee, consisting of 21 members, considered 79 papers and selected 26 for presentation; one of them was withdrawn by the authors. These papers were selected on the basis of originality, quality and relevance to cryptography and security in communication networks. Due to the high number of submissions, paper selection was a di?cult and challenging task, and many good submissions had to be rejected. Each subm- sion was refereed by at least three reviewers and some had four reports or more. We are very grateful to all the program committee members, who devoted much e?ort and valuable time to read and select the papers. In addition, we gratefully acknowledge the help of colleagues who reviewed submissions in their areas of expertise. They are all listed on page VII and we apologize for any inadvertent omissions. These proceedings include the revised versions of the 26 accepted papers andtheabstractoftheinvitedtalkbyBartPreneel(ECRYPT:theCryptographic Research Challenges for the Next Decade).

Keywords

  • Oracle
  • Session
  • Signatur
  • anonymity
  • communication
  • cryptographic protocols
  • identity
  • network security
  • privacy
  • secret sharing
  • secure communications
  • secure networking
  • security
  • security protocols
  • zero knowledge
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Dipartimento di Informatica e Applicazioni, Università degli Studi di Salerno, Fisciano, Italy

    Carlo Blundo

  • Dipartimento di Tecnologie dell’Informazione, Universitá di Milano, Crema, Italy

    Stelvio Cimato

Bibliographic Information

Buying options

eBook USD 99.00
Price excludes VAT (USA)
  • ISBN: 978-3-540-30598-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 129.00
Price excludes VAT (USA)