Skip to main content
  • Conference proceedings
  • © 2017

Financial Cryptography and Data Security

21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10322)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): FC: International Conference on Financial Cryptography and Data Security

Conference proceedings info: FC 2017.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (36 papers)

  1. Front Matter

    Pages i-xiv
  2. Privacy and Identity Management

    1. Front Matter

      Pages 1-1
    2. An Efficient Self-blindable Attribute-Based Credential Scheme

      • Sietse Ringers, Eric Verheul, Jaap-Henk Hoepman
      Pages 3-20
    3. Real Hidden Identity-Based Signatures

      • Sherman S. M. Chow, Haibin Zhang, Tao Zhang
      Pages 21-38
    4. BehavioCog: An Observation Resistant Authentication Scheme

      • Jagmohan Chauhan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Jonathan Chan, Mohamed Ali Kaafar
      Pages 39-58
    5. Updatable Tokenization: Formal Definitions and Provably Secure Constructions

      • Christian Cachin, Jan Camenisch, Eduarda Freire-Stögbuchner, Anja Lehmann
      Pages 59-75
  3. Privacy and Data Processing

    1. Front Matter

      Pages 77-77
    2. SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates

      • Qian Wang, Kui Ren, Minxin Du, Qi Li, Aziz Mohaisen
      Pages 79-97
    3. Outsourcing Medical Dataset Analysis: A Possible Solution

      • Gabriel Kaptchuk, Matthew Green, Aviel Rubin
      Pages 98-123
    4. Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation

      • David Derler, Sebastian Ramacher, Daniel Slamanig
      Pages 124-142
  4. Cryptographic Primitives and API’s

    1. Front Matter

      Pages 143-143
    2. A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies

      • Youngho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev
      Pages 163-181
    3. Optimally Sound Sigma Protocols Under DCRA

      • Helger Lipmaa
      Pages 182-203
    4. Economically Optimal Variable Tag Length Message Authentication

      • Reihaneh Safavi-Naini, Viliam Lisý, Yvo Desmedt
      Pages 204-223
  5. Vulnerabilities and Exploits

    1. Front Matter

      Pages 225-225
    2. PEEP: Passively Eavesdropping Private Input via Brainwave Signals

      • Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena
      Pages 227-246
    3. Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript

      • Michael Schwarz, Clémentine Maurice, Daniel Gruss, Stefan Mangard
      Pages 247-267
    4. Attacks on Secure Logging Schemes

      • Gunnar Hartung
      Pages 268-284
    5. Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS

      • Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders, Ivan Martinovic
      Pages 285-301

Other Volumes

  1. Financial Cryptography and Data Security

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017.

The 30 revised full papers and 5 short papers were carefully selected and reviewed from 132 submissions. The papers are grouped in the following topical sections: Privacy and Identity Management; Privacy and Data Processing; Cryptographic Primitives and API's; Vulnerabilities and Exploits; Blockchain Technology; Security of Internet Protocols; Blind signatures; Searching and Processing Private Data; Secure Channel Protocols; and Privacy in Data Storage and Retrieval.

Editors and Affiliations

  • University of Edinburgh, Edinburgh, UK

    Aggelos Kiayias

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access