Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers

  • B E
N/ACitations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications. Keynote speeches ; Security and privacy in the IoT / Elisa Bertino -- On crossroads of privacy protection / Mirosław Kutyłowski -- The dual role of smartphones in IoT security / Kui Ren -- Cryptographic protocols and algorithms ; Implementing indistinguishability obfuscation using GGH15 / Zheng Zhang, Fangguo Zhang, and Huang Zhang -- From attack on Feige-Shamir to construction of oblivious transfer / Jingyue Yu, Yi Deng, and Yu Chen -- A new lattice sieving algorithm base on angular locality-sensitive hashing / Ping Wang and Dongdong Shang -- A simpler Bitcoin voting protocol / Haibo Tian, Liqing Fu, and Jiejie He -- Post-quantum secure remote password protocol from RLWE problem / Xinwei Gao, Jintai Ding, Jiqiang Liu, and Lin Li -- Hashing into twisted Jacobi intersection curves / Xiaoyang He, Wei Yu, and Kunpeng Wang -- Digital signatures ; Identity-based key-insulated aggregate signatures, revisited / Nobuaki Kitajima, Naoto Yanai, and Takashi Nishide -- A new constant-size accountable ring signature scheme without random oracles / Sudhakar Kumawat and Souradyuti Paul -- A universal designated multi-verifier transitive signature scheme / Fei Zhu, Yuexin Zhang, Chao Lin, Wei Wu, and Ru Meng -- Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme / Xiaodong Yang, Ping Yang, Faying An, Shudong Li, Caifen Wang, and Dengguo Feng -- Encryption ; Parallel long messages encryption scheme based on certificateless cryptosystem for big data / Xuguang Wu, Yiliang Han, Minqing Zhang, and Shuaishuai Zhu -- Constant decryption-cost non-monotonic ciphertext policy attribute-based encryption with reduced secret key size (and dynamic attributes) / Geng Wang, Xiao Zhang, and Yanmei Li -- Fully homomorphic encryption scheme based on public key compression and batch processing / Liquan Chen, Ming Lim, and Muyang Wang -- Leveled FHE with matrix message space / Biao Wang, Xueqing Wang, and Rui Xue -- Predicate fully homomorphic encryption: achieving fine-grained access control over manipulable ciphertext / Hanwen Feng, Jianwei Liu, Qianhong Wu, and Weiran Liu. Cryptanalysis and attack ; NativeSpeaker : identifying crypto misuses in Android native code libraries / Qing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li, and Dawu Gu -- A game-based framework towards cyber-attacks on state estimation in ICSs / Cong Chen, Dongdai Lin, Wei Zhang, and Xiaojun Zhou -- Cryptanalysis of Acorn in nonce-reuse setting / Xiaojuan Zhang and Dongdai Lin -- An improved method to unveil malware's hidden behavior / Qiang Li, Yunan Zhang, Liya Su, Yang Wu, Xinjian Ma, and Zeming Yang -- BotTokenizer : exploring network tokens of HTTP-based botnet using malicious network traces / Biao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, and Jianguo Jiang -- Improved cryptanalysis of an ISO standard lightweight block cipher with refined MILP modelling / Jun Yin, Chuyan Ma, Lijun Lyu, Jian Song, Guang Zeng, Chuangui Ma, and Fushan Wei -- Meet in the middle attack on type-1 Feistel construction / Yuanhao Deng, Chenhui Jin, and Rongjia Li -- Applications ; Influence of error on Hamming weights for ASCA / Chujiao Ma, John Chandy, Laurent Michel, Fanghui Liu, and Waldemar Cruz -- State-of-the-art : security competition in talent education / Xiu Zhang, Baoxu Liu, Xiaorui Gong, and Zhenyu Song -- A modified fuzzy fingerprint vault based on pair-polar minutiae structures / Xiangmin Li, Ning Ding, Haining Lu, Dawu Gu, Shanshan Wang, Beibei Xu, Yuan Yuan, and Siyun Yan -- NOR : towards non-intrusive, real-time and OS-agnostic introspection for virtual machines in cloud environment / Chonghua Wang, Zhiyu Hao, and Xiaochun Yun -- A method to enlarge the design distance of BCH codes and some classes of infinite optimal cyclic codes / Shanding Xu, Xiwang Cao, and Chunming Tang.

Cite

CITATION STYLE

APA

B, E. B. (2018). Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi’an, China, November 3-5, 2017, Revised Selected Papers, 10726, 3–10. Retrieved from https://doi.org/10.1007/978-3-319-75160-3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free