Skip to main content
  • Conference proceedings
  • © 2018

Information Security and Privacy

23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10946)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 2018.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (52 papers)

  1. Front Matter

    Pages I-XV
  2. Foundation

    1. Front Matter

      Pages 1-1
    2. A Deterministic Algorithm for Computing Divisors in an Interval

      • Liqiang Peng, Yao Lu, Noboru Kunihiro, Rui Zhang, Lei Hu
      Pages 3-12
    3. Reusable Fuzzy Extractor from LWE

      • Yunhua Wen, Shengli Liu
      Pages 13-27
    4. A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.’s Construction

      • Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee
      Pages 28-44
    5. Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority

      • Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida
      Pages 64-82
    6. Towards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRS

      • Eunkyung Kim, Hyang-Sook Lee, Jeongeun Park
      Pages 101-113
    7. Robust Multiparty Computation with Faster Verification Time

      • Souradyuti Paul, Ananya Shrivastava
      Pages 114-131
  3. Symmetric-Key Cryptography

    1. Front Matter

      Pages 133-133
    2. New Iterated RC4 Key Correlations

      • Ryoma Ito, Atsuko Miyaji
      Pages 154-171
    3. Differential Attacks on Reduced Round LILLIPUT

      • Nicolas Marrière, Valérie Nachef, Emmanuel Volte
      Pages 188-206
    4. Bounds on Differential and Linear Branch Number of Permutations

      • Sumanta Sarkar, Habeeb Syed
      Pages 207-224
  4. Public-Key Cryptography

    1. Front Matter

      Pages 243-243
    2. Forward-Secure Linkable Ring Signatures

      • Xavier Boyen, Thomas Haines
      Pages 245-264
    3. Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem

      • Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu
      Pages 265-283

Other Volumes

  1. Information Security and Privacy

About this book

This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018.

The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions. The papers present theories, techniques, implementations, applications and practical experiences on a variety of topics such as foundations, symmetric-key cryptography, public-key cryptography, cloud security, post-quantum cryptography, security protocol, system and network security, and blockchain and cryptocurrency.

Editors and Affiliations

  • University of Wollongong, Wollongong, Australia

    Willy Susilo, Guomin Yang

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access