Information Security and Cryptology

10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers

  • Dongdai Lin
  • Moti Yung
  • Jianying Zhou

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8957)

Also part of the Security and Cryptology book sub series (LNSC, volume 8957)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Privacy and Anonymity

    1. Front Matter
      Pages 1-1
    2. Weiwei Liu, Yi Mu, Guomin Yang
      Pages 3-15
    3. Paolo Palmieri, Luca Calderoni, Dario Maio
      Pages 16-36
  3. Multiparty and Outsource Computation

    1. Front Matter
      Pages 49-49
    2. James Alderman, Christian Janson, Carlos Cid, Jason Crampton
      Pages 51-71
    3. Constantinos Patsakis, Michael Clear, Paul Laird
      Pages 72-89
  4. Signature and Security Protocols

    1. Front Matter
      Pages 91-91
    2. Denisse Muñante Arzapalo, Vanea Chiprianov, Laurent Gallon, Philippe Aniorté
      Pages 150-169
    3. Ioana Boureanu, Serge Vaudenay
      Pages 170-190
  5. Lattice and Public Key Cryptography

    1. Front Matter
      Pages 191-191
    2. Fuqun Wang, Kunpeng Wang
      Pages 220-238
    3. Russell W. F. Lai, Henry K. F. Cheung, Sherman S. M. Chow
      Pages 239-256
  6. Block Cipher and Hash Function

    1. Front Matter
      Pages 257-257

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.

Keywords

Anonymity Authentication Block cipher Cryptanalysis Cryptographic application Cryptographic primitive Elliptic curve cryptography Encryption Hash function Lattice cryptography Meet in the middle Multiparty computation Obfuscation Oblivious transfer Outsource computation Privacy Public key cryptography Security protocols Signature protocols zero knowledge

Editors and affiliations

  • Dongdai Lin
    • 1
  • Moti Yung
    • 2
  • Jianying Zhou
    • 3
  1. 1.SKLOIS, Institute of EngineeringChinese Academy of SciencesBeijingChina
  2. 2.Computer Science DepartmentColumbia UniversityNew YorkUSA
  3. 3.Infocomm Security DepartmentInstitute for Infocomm ResearchSingaporeSingapore

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-16745-9
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-16744-2
  • Online ISBN 978-3-319-16745-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Pharma
Automotive
Electronics
Telecommunications
Consumer Packaged Goods
Aerospace