Applied Cryptography and Network Security: 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

ACNS 2010, the 8th International Conference on Applied Cryptography and Network Security, was held in Beijing, China, during June 22-25, 2010. ACNS 2010 brought together individuals from academia and industry involved in m- tiple research disciplines of cryptography and security to foster the exchange of ideas. ACNS was initiated in 2003, and there has been a steady improvement in the quality of its program over the past 8 years: ACNS 2003 (Kunming, China), ACNS 2004 (Yellow Mountain, China), ACNS 2005 (New York, USA), ACNS 2006 (Singapore), ACNS 2007 (Zhuhai, China), ACNS 2008 (New York, USA), ACNS2009(Paris,France). Theaverageacceptanceratehasbeenkeptataround 17%, and the average number of participants has been kept at around 100. The conference received a total of 178 submissions from all over the world. Each submission was assigned to at least three committee members. Subm- sions co-authored by members of the Program Committee were assigned to at least four committee members. Due to the large number of high-quality s- missions, the review process was challenging and we are deeply grateful to the committee members and the external reviewers for their outstanding work. - ter extensive discussions, the Program Committee selected 32 submissions for presentation in the academic track, and these are the articles that are included in this volume (LNCS 6123). Additionally, a few other submissionswereselected for presentation in the non-archival industrial track.

Author(s): Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud (auth.), Jianying Zhou, Moti Yung (eds.)
Series: Lecture Notes in Computer Science 6123 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010

Language: English
Pages: 564
Tags: Data Encryption; Discrete Mathematics in Computer Science; Computer Communication Networks; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Systems and Data Security

Front Matter....Pages -
On the Broadcast and Validity-Checking Security of pkcs #1 v1.5 Encryption....Pages 1-18
How to Construct Interval Encryption from Binary Tree Encryption....Pages 19-34
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions....Pages 35-52
Trapdoor Sanitizable Signatures Made Easy....Pages 53-68
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs....Pages 69-86
Redactable Signatures for Tree-Structured Data: Definitions and Constructions....Pages 87-104
Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions....Pages 105-122
Multi-trail Statistical Saturation Attacks....Pages 123-138
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G  ⊕  ....Pages 139-153
High Performance GHASH Function for Long Messages....Pages 154-167
Principles on the Security of AES against First and Second-Order Differential Power Analysis....Pages 168-185
Adaptive Chosen-Message Side-Channel Attacks....Pages 186-199
Secure Multiplicative Masking of Power Functions....Pages 200-217
Batch Groth–Sahai....Pages 218-235
Efficient and Secure Evaluation of Multivariate Polynomials and Applications....Pages 236-254
Efficient Implementation of the Orlandi Protocol....Pages 255-272
Improving the Round Complexity of Traitor Tracing Schemes....Pages 273-290
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters....Pages 291-308
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead....Pages 309-328
Deniable Internet Key Exchange....Pages 329-348
A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm....Pages 349-366
Secure Sketch for Multiple Secrets....Pages 367-383
A Message Recognition Protocol Based on Standard Assumptions....Pages 384-401
Affiliation-Hiding Key Exchange with Untrusted Group Authorities....Pages 402-419
Privacy-Preserving Group Discovery with Linear Complexity....Pages 420-437
Two New Efficient PIR-Writing Protocols....Pages 438-455
Regulatory Compliant Oblivious RAM....Pages 456-474
Revisiting Unpredictability-Based RFID Privacy Models....Pages 475-492
On RFID Privacy with Mutual Authentication and Tag Corruption....Pages 493-510
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures....Pages 511-528
COP: A Step toward Children Online Privacy....Pages 529-544
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising....Pages 545-562
Back Matter....Pages -