Information security and cryptology 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers /: 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers. (2020)
- Record Type:
- Book
- Title:
- Information security and cryptology 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers /: 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers. (2020)
- Main Title:
- Information security and cryptology 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers
- Other Titles:
- Inscrypt 2019
- Further Information:
- Note: Zhe Liu, Moti Yung (eds.).
- Other Names:
- Liu, Zhe
Yung, Moti
Inscrypt (Conference), 15th - Contents:
- Intro -- Preface -- Organization -- Contents -- Invited Paper -- Revocable and Linkable Ring Signature -- 1 Introduction -- 1.1 Ring Signature and Variants -- 1.2 Ring Confidential Transaction -- 1.3 Our Contributions -- 2 Related Work -- 3 Preliminaries -- 3.1 Mathematical Assumptions -- 3.2 ElGamal Public Key Encryption -- 3.3 Signature of Knowledge -- 4 Revocable and Linkable Ring Signature -- 4.1 Technical Description -- 4.2 Security Definitions -- 4.3 Scheme Description -- 4.4 Correctness Analysis -- 4.5 Security Analysis -- 5 Efficiency Analysis -- 6 Conclusion -- References Post-Quantum Cryptography -- Efficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key Consensus -- 1 Introduction -- 1.1 Related Works -- 1.2 Our Contributions -- 2 Preliminaries -- 2.1 Notation -- 2.2 Key Consensus -- 2.3 Hard Problems -- 2.4 Security Model -- 3 Password-Authenticated Key Exchange -- 3.1 The Protocol -- 3.2 Correctness -- 4 Security -- 5 Implementation -- 5.1 Portable C Implementation -- 5.2 AVX2 Implementation -- 6 Results and Comparison -- 7 Conclusions -- References A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model -- 1 Introduction -- 2 Preliminaries -- 2.1 Certificateless Public Key Encryption with Equality Test -- 2.2 Lattices -- 3 Proposed Construction: CL-PKEET -- 3.1 Construction -- 3.2 Parameters -- 3.3 Security Analysis -- 4 Conclusion -- References -- Attribute-Based Keyword Search from Lattices -- 1Intro -- Preface -- Organization -- Contents -- Invited Paper -- Revocable and Linkable Ring Signature -- 1 Introduction -- 1.1 Ring Signature and Variants -- 1.2 Ring Confidential Transaction -- 1.3 Our Contributions -- 2 Related Work -- 3 Preliminaries -- 3.1 Mathematical Assumptions -- 3.2 ElGamal Public Key Encryption -- 3.3 Signature of Knowledge -- 4 Revocable and Linkable Ring Signature -- 4.1 Technical Description -- 4.2 Security Definitions -- 4.3 Scheme Description -- 4.4 Correctness Analysis -- 4.5 Security Analysis -- 5 Efficiency Analysis -- 6 Conclusion -- References Post-Quantum Cryptography -- Efficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key Consensus -- 1 Introduction -- 1.1 Related Works -- 1.2 Our Contributions -- 2 Preliminaries -- 2.1 Notation -- 2.2 Key Consensus -- 2.3 Hard Problems -- 2.4 Security Model -- 3 Password-Authenticated Key Exchange -- 3.1 The Protocol -- 3.2 Correctness -- 4 Security -- 5 Implementation -- 5.1 Portable C Implementation -- 5.2 AVX2 Implementation -- 6 Results and Comparison -- 7 Conclusions -- References A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model -- 1 Introduction -- 2 Preliminaries -- 2.1 Certificateless Public Key Encryption with Equality Test -- 2.2 Lattices -- 3 Proposed Construction: CL-PKEET -- 3.1 Construction -- 3.2 Parameters -- 3.3 Security Analysis -- 4 Conclusion -- References -- Attribute-Based Keyword Search from Lattices -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Overview of Our Construction -- 1.3 Related Work -- 1.4 Organization -- 2 Preliminaries -- 2.1 Lattices -- 3 Attribute-Based Keyword Search 3.1 Definition of Key-Policy Attribute-Based Keyword Search -- 3.2 Correctness Consistence -- 3.3 Security -- 4 Our KP-ABKS Construction -- 5 Conclusion -- References -- Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems -- 1 Introduction -- 1.1 Our Results -- 2 Preliminaries -- 2.1 Isogenies -- 2.2 (Group) Key Exchange -- 3 CSIDH -- 4 Proposed Group Key Exchange from CSIDH (G-CSIDH) -- 4.1 CSIDH Group Key Exchange (G-CSIDH) -- 4.2 Security of G-CSIDH -- 5 Trusted Setup from G-CSIDH -- 5.1 Proposed Trusted Setup in Isogeny-Based Cryptosystems 5.2 Proof of Trust in Setup -- 5.3 Trusted Setup in SIDH -- 6 Conclusions -- References -- AI Security -- RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR Systems -- 1 Introduction -- 2 Background -- 2.1 License Plate Recognition -- 2.2 HYPERLPR -- 3 Problem Statement -- 3.1 Attack Goal -- 3.2 Attack Scenarios -- 3.3 The Capability of Adversaries -- 4 The RoLMA Methodology -- 4.1 Illumination -- 4.2 Realistic Approximation -- 4.3 Loss Calculation -- 5 Evaluation -- 5.1 RQ1: Effectiveness -- 5.2 RQ2: Practicability -- 5.3 RQ3: Imperceptibility -- 6 Discussion -- 7 Related Work … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource (560 p.)
- Subjects:
- 005.8
Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer security
Data encryption (Computer science)
Electronic books
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783030429218
3030429210
3030429202
9783030429201
9783030429225
3030429229 - Related ISBNs:
- 9783030429201
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.507690
- Ingest File:
- 03_084.xml