Skip to main content
  • Conference proceedings
  • © 2016

Information Security and Privacy

21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9723)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 2016.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (34 papers)

  1. Front Matter

    Pages I-XVIII
  2. Signature and Key Management

    1. Front Matter

      Pages 1-1
    2. One-Round Strong Oblivious Signature-Based Envelope

      • Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, Mingwu Zhang
      Pages 3-20
    3. Proxy Signature with Revocation

      • Shengmin Xu, Guomin Yang, Yi Mu, Sha Ma
      Pages 21-36
    4. On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures

      • Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione
      Pages 37-54
  3. Public Key and Identity-Based Encryption

    1. Front Matter

      Pages 55-55
    2. Content-Based Encryption

      • Xiaofen Wang, Yi Mu
      Pages 57-72
    3. Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry

      • Zhe Xia, Xiaoyun Yang, Min Xiao, Debiao He
      Pages 73-86
    4. Identity-Based Group Encryption

      • Xiling Luo, Yili Ren, Jingwen Liu, Jiankun Hu, Weiran Liu, Zhen Wang et al.
      Pages 87-102
    5. Edit Distance Based Encryption and Its Application

      • Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Kaitai Liang
      Pages 103-119
    6. Proxy Re-encryption with Delegatable Verifiability

      • Xiaodong Lin, Rongxing Lu
      Pages 120-133
    7. Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions

      • Shi-Feng Sun, Udaya Parampalli, Tsz Hon Yuen, Yu Yu, Dawu Gu
      Pages 134-150
  4. Searchable Encryption

    1. Front Matter

      Pages 151-151
    2. Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage

      • Tong Li, Zheli Liu, Ping Li, Chunfu Jia, Zoe L. Jiang, Jin Li
      Pages 153-169
    3. Public Key Encryption with Authorized Keyword Search

      • Peng Jiang, Yi Mu, Fuchun Guo, Qiaoyan Wen
      Pages 170-186
    4. Linear Encryption with Keyword Search

      • Shiwei Zhang, Guomin Yang, Yi Mu
      Pages 187-203
  5. Broadcast Encryption

    1. Front Matter

      Pages 205-205
    2. Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security

      • Kai He, Jian Weng, Man Ho Au, Yijun Mao, Robert H. Deng
      Pages 207-222
    3. Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing

      • Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, Rongmao Chen
      Pages 223-239
  6. Mathematical Primitives

    1. Front Matter

      Pages 241-241

Other Volumes

  1. Information Security and Privacy

About this book

The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016.

The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully reviewed and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random / One-Way Function.

Editors and Affiliations

  • Monash University , Melbourne, Australia

    Joseph K. Liu, Ron Steinfeld

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access