Security and Cryptography for Networks

11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings

  • Dario Catalano
  • Roberto De Prisco
Conference proceedings SCN 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11035)

Also part of the Security and Cryptology book sub series (LNSC, volume 11035)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Signatures and Watermarking

    1. Front Matter
      Pages 1-1
    2. Masayuki Abe, Miguel Ambrona, Miyako Ohkubo, Mehdi Tibouchi
      Pages 3-22
    3. Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
      Pages 23-42
    4. Dario Fiore, Elena Pagnin
      Pages 43-62
    5. Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu
      Pages 63-80
  3. Composability

    1. Front Matter
      Pages 81-81
    2. Christian Badertscher, Fabio Banfi, Ueli Maurer
      Pages 102-120
  4. Encryption I

    1. Front Matter
      Pages 121-121
    2. Romain Gay, Lucas Kowalczyk, Hoeteck Wee
      Pages 123-139
    3. Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
      Pages 140-159
    4. Jung Hee Cheon, Duhyeong Kim, Joohee Lee, Yongsoo Song
      Pages 160-177
  5. Multiparty Computation

    1. Front Matter
      Pages 179-179
    2. Marcel Keller, Dragos Rotaru, Nigel P. Smart, Tim Wood
      Pages 181-199
    3. Karim Eldefrawy, Rafail Ostrovsky, Sunoo Park, Moti Yung
      Pages 200-215
    4. Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
      Pages 216-234
  6. Anonymity and Zero Knowledge

    1. Front Matter
      Pages 253-253
    2. Adam L. Young, Moti Yung
      Pages 255-273
    3. Elette Boyle, Saleet Klein, Alon Rosen, Gil Segev
      Pages 274-291
    4. Ben Berger, Zvika Brakerski
      Pages 292-309
  7. Secret Sharing and Oblivious Transfer

    1. Front Matter
      Pages 311-311
    2. Amos Beimel, Hussien Othman
      Pages 313-332
    3. Ignacio Cascudo, René Bødker Christensen, Jaron Skovsted Gundersen
      Pages 333-348
  8. Lattices and Post Quantum Cryptography

    1. Front Matter
      Pages 349-349
    2. Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite et al.
      Pages 351-367
    3. Carsten Baum, Ivan Damgård, Vadim Lyubashevsky, Sabine Oechsner, Chris Peikert
      Pages 368-385
  9. Obfuscation

    1. Front Matter
      Pages 405-405
    2. Yuan Kang, Chengyu Lin, Tal Malkin, Mariana Raykova
      Pages 407-424
    3. Zvika Brakerski, Aayush Jain, Ilan Komargodski, Alain Passelègue, Daniel Wichs
      Pages 425-441
  10. Two-Party Computation

    1. Front Matter
      Pages 443-443
    2. Ran Gelles, Anat Paskin-Cherniavsky, Vassilis Zikas
      Pages 445-463
    3. Michele Ciampi, Claudio Orlandi
      Pages 464-482
  11. Protocols

    1. Front Matter
      Pages 483-483
    2. Jung Yeon Hwang, Stanislaw Jarecki, Taekyoung Kwon, Joohee Lee, Ji Sun Shin, Jiayu Xu
      Pages 485-504
    3. Aggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, Thomas Zacharias
      Pages 505-523
  12. Encryption II

    1. Front Matter
      Pages 525-525
    2. Marc Joye, Alain Passelègue
      Pages 527-543
    3. Sam Kim, Kevin Lewi, Avradip Mandal, Hart Montgomery, Arnab Roy, David J. Wu
      Pages 544-562
    4. Junqing Gong, Benoît Libert, Somindu C. Ramanna
      Pages 563-582
  13. Back Matter
    Pages 583-584

About these proceedings


This book constitutes the proceedings of the 11th International Conference on Security and Cryptography for Networks, SCN 2018, held in Amalfi, Italy, in September 2018.

The 30 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on signatures and watermarking; composability; encryption; multiparty computation; anonymity and zero knowledge; secret sharing and oblivious transfer; lattices and post quantum cryptography; obfuscation; two-party computation; and protocols.


authentication ciphertexts communication channels in information theory computer crime cryptographic protocols cryptography data encryption data mining data privacy data security digital signature electronic document identification systems network security PK privacy preserving project management public key cryptography Public Keys software engineering structural design

Editors and affiliations

  • Dario Catalano
    • 1
  • Roberto De Prisco
    • 2
  1. 1.University of CataniaCataniaItaly
  2. 2.University of SalernoFiscianoItaly

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking