This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications. Keynote speeches ; Security and privacy in the IoT / Elisa Bertino -- On crossroads of privacy protection / Mirosław Kutyłowski -- The dual role of smartphones in IoT security / Kui Ren -- Cryptographic protocols and algorithms ; Implementing indistinguishability obfuscation using GGH15 / Zheng Zhang, Fangguo Zhang, and Huang Zhang -- From attack on Feige-Shamir to construction of oblivious transfer / Jingyue Yu, Yi Deng, and Yu Chen -- A new lattice sieving algorithm base on angular locality-sensitive hashing / Ping Wang and Dongdong Shang -- A simpler Bitcoin voting protocol / Haibo Tian, Liqing Fu, and Jiejie He -- Post-quantum secure remote password protocol from RLWE problem / Xinwei Gao, Jintai Ding, Jiqiang Liu, and Lin Li -- Hashing into twisted Jacobi intersection curves / Xiaoyang He, Wei Yu, and Kunpeng Wang -- Digital signatures ; Identity-based key-insulated aggregate signatures, revisited / Nobuaki Kitajima, Naoto Yanai, and Takashi Nishide -- A new constant-size accountable ring signature scheme without random oracles / Sudhakar Kumawat and Souradyuti Paul -- A universal designated multi-verifier transitive signature scheme / Fei Zhu, Yuexin Zhang, Chao Lin, Wei Wu, and Ru Meng -- Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme / Xiaodong Yang, Ping Yang, Faying An, Shudong Li, Caifen Wang, and Dengguo Feng -- Encryption ; Parallel long messages encryption scheme based on certificateless cryptosystem for big data / Xuguang Wu, Yiliang Han, Minqing Zhang, and Shuaishuai Zhu -- Constant decryption-cost non-monotonic ciphertext policy attribute-based encryption with reduced secret key size (and dynamic attributes) / Geng Wang, Xiao Zhang, and Yanmei Li -- Fully homomorphic encryption scheme based on public key compression and batch processing / Liquan Chen, Ming Lim, and Muyang Wang -- Leveled FHE with matrix message space / Biao Wang, Xueqing Wang, and Rui Xue -- Predicate fully homomorphic encryption: achieving fine-grained access control over manipulable ciphertext / Hanwen Feng, Jianwei Liu, Qianhong Wu, and Weiran Liu. Cryptanalysis and attack ; NativeSpeaker : identifying crypto misuses in Android native code libraries / Qing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li, and Dawu Gu -- A game-based framework towards cyber-attacks on state estimation in ICSs / Cong Chen, Dongdai Lin, Wei Zhang, and Xiaojun Zhou -- Cryptanalysis of Acorn in nonce-reuse setting / Xiaojuan Zhang and Dongdai Lin -- An improved method to unveil malware's hidden behavior / Qiang Li, Yunan Zhang, Liya Su, Yang Wu, Xinjian Ma, and Zeming Yang -- BotTokenizer : exploring network tokens of HTTP-based botnet using malicious network traces / Biao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, and Jianguo Jiang -- Improved cryptanalysis of an ISO standard lightweight block cipher with refined MILP modelling / Jun Yin, Chuyan Ma, Lijun Lyu, Jian Song, Guang Zeng, Chuangui Ma, and Fushan Wei -- Meet in the middle attack on type-1 Feistel construction / Yuanhao Deng, Chenhui Jin, and Rongjia Li -- Applications ; Influence of error on Hamming weights for ASCA / Chujiao Ma, John Chandy, Laurent Michel, Fanghui Liu, and Waldemar Cruz -- State-of-the-art : security competition in talent education / Xiu Zhang, Baoxu Liu, Xiaorui Gong, and Zhenyu Song -- A modified fuzzy fingerprint vault based on pair-polar minutiae structures / Xiangmin Li, Ning Ding, Haining Lu, Dawu Gu, Shanshan Wang, Beibei Xu, Yuan Yuan, and Siyun Yan -- NOR : towards non-intrusive, real-time and OS-agnostic introspection for virtual machines in cloud environment / Chonghua Wang, Zhiyu Hao, and Xiaochun Yun -- A method to enlarge the design distance of BCH codes and some classes of infinite optimal cyclic codes / Shanding Xu, Xiwang Cao, and Chunming Tang.
CITATION STYLE
B, E. B. (2018). Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi’an, China, November 3-5, 2017, Revised Selected Papers, 10726, 3–10. Retrieved from https://doi.org/10.1007/978-3-319-75160-3
Mendeley helps you to discover research relevant for your work.