Skip to main content
  • Conference proceedings
  • © 2004

Information Security and Privacy

9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3108)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 2004.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (41 papers)

  1. Front Matter

  2. Broadcast Encryption and Traitor Tracing

    1. Multi-service Oriented Broadcast Encryption

      • Shaoquan Jiang, Guang Gong
      Pages 1-11
    2. Linear Code Implies Public-Key Traitor Tracing with Revocation

      • Vu Dong Tô, Reihaneh Safavi-Naini
      Pages 24-35
    3. TTS without Revocation Capability Secure Against CCA2

      • Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
      Pages 36-49
  3. Private Information Retrieval and Oblivious Transfer

    1. Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions

      • Goichiro Hanaoka, Hideki Imai, Joern Mueller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas Winter
      Pages 62-73
  4. Trust and Secret Sharing

    1. NGSCB: A Trusted Open System

      • Marcus Peinado, Yuqun Chen, Paul England, John Manferdelli
      Pages 86-97
  5. Cryptanalysis (I)

    1. The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers

      • Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle
      Pages 98-109
    2. Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2

      • Yongsup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee
      Pages 110-122
    3. The Related-Key Rectangle Attack – Application to SHACAL-1

      • Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong
      Pages 123-136
    4. Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1

      • Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee
      Pages 137-148
  6. Cryptanalysis (II)

    1. Analysis and Improvement of Micali’s Fair Contract Signing Protocol

      • Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu
      Pages 176-187
  7. Digital Signatures (I)

    1. Generic Construction of Certificateless Signature

      • Dae Hyun Yum, Pil Joong Lee
      Pages 200-211
  8. Cryptosystems (I)

    1. A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model

      • Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai
      Pages 212-223

Other Volumes

  1. Information Security and Privacy

About this book

The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie U- versity and the Australian Computer Society. Theaimsoftheconferencearetobringtogetherresearchersandpractitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The - viewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, ?ve each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. ThisyeartheprogramcommitteeintroducedtheBestStudentPaperAward. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication.

Editors and Affiliations

  • Centre for Advanced Computing - Algorithms and Cryptography Department of Computing, Macquarie University, Australia

    Huaxiong Wang

  • Department of Computing, Macquarie University, Sydney, Australia

    Josef Pieprzyk

  • Macquarie University, Sydney, Australia

    Vijay Varadharajan

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access