Skip to main content
  • Conference proceedings
  • © 2015

Applied Cryptography and Network Security

13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9092)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACNS: International Conference on Applied Cryptography and Network Security

Conference proceedings info: ACNS 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (33 papers)

  1. Front Matter

    Pages I-XVIII
  2. Secure Computation I: Primitives and New Models

    1. Front Matter

      Pages 1-1
    2. Communication-Optimal Proactive Secret Sharing for Dynamic Groups

      • Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky
      Pages 23-41
  3. Public Key Cryptographic Primitives

    1. Front Matter

      Pages 63-63
    2. Generic Construction of UC-Secure Oblivious Transfer

      • Olivier Blazy, Céline Chevalier
      Pages 65-86
    3. Non-malleability Under Selective Opening Attacks: Implication and Separation

      • Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen
      Pages 87-104
    4. A Signature Scheme with a Fuzzy Private Key

      • Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki
      Pages 105-126
  4. Secure Computation II: Applications

    1. Front Matter

      Pages 147-147
    2. Zero-Knowledge Authenticated Order Queries and Order Statistics on a List

      • Esha Ghosh, Olga Ohrimenko, Roberto Tamassia
      Pages 149-171
    3. Private Database Access with HE-over-ORAM Architecture

      • Craig Gentry, Shai Halevi, Charanjit Jutla, Mariana Raykova
      Pages 172-191
    4. Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures

      • Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama
      Pages 192-214
    5. LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data

      • Weiyu Jiang, Jingqiang Lin, Zhan Wang, Huorong Li, Lei Wang
      Pages 215-239
  5. Anonymity and Related Applications

    1. Front Matter

      Pages 241-241
    2. Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking

      • Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik
      Pages 243-262
    3. Post-Quantum Forward-Secure Onion Routing

      • Satrajit Ghosh, Aniket Kate
      Pages 263-286
    4. Scalable Divisible E-cash

      • Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré
      Pages 287-306
    5. Recovering Lost Device-Bound Credentials

      • Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven
      Pages 307-327

Other Volumes

  1. Applied Cryptography and Network Security

About this book

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement;  authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.

Editors and Affiliations

  • Columbia University, New York, USA

    Tal Malkin, Allison Bishop Lewko

  • Bell Labs, Murray Hill, USA

    Vladimir Kolesnikov

  • Stony Brook University, Stony Brook, USA

    Michalis Polychronakis

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access