Applied Cryptography and Network Security
8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings
Editors: Zhou, Jianying, Yung, Moti (Eds.)
Free PreviewBuy this book
- About this book
-
ACNS 2010, the 8th International Conference on Applied Cryptography and Network Security, was held in Beijing, China, during June 22-25, 2010. ACNS 2010 brought together individuals from academia and industry involved in m- tiple research disciplines of cryptography and security to foster the exchange of ideas. ACNS was initiated in 2003, and there has been a steady improvement in the quality of its program over the past 8 years: ACNS 2003 (Kunming, China), ACNS 2004 (Yellow Mountain, China), ACNS 2005 (New York, USA), ACNS 2006 (Singapore), ACNS 2007 (Zhuhai, China), ACNS 2008 (New York, USA), ACNS2009(Paris,France). Theaverageacceptanceratehasbeenkeptataround 17%, and the average number of participants has been kept at around 100. The conference received a total of 178 submissions from all over the world. Each submission was assigned to at least three committee members. Subm- sions co-authored by members of the Program Committee were assigned to at least four committee members. Due to the large number of high-quality s- missions, the review process was challenging and we are deeply grateful to the committee members and the external reviewers for their outstanding work. - ter extensive discussions, the Program Committee selected 32 submissions for presentation in the academic track, and these are the articles that are included in this volume (LNCS 6123). Additionally, a few other submissionswereselected for presentation in the non-archival industrial track.
- Table of contents (32 chapters)
-
-
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption
Pages 1-18
-
How to Construct Interval Encryption from Binary Tree Encryption
Pages 19-34
-
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions
Pages 35-52
-
Trapdoor Sanitizable Signatures Made Easy
Pages 53-68
-
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Pages 69-86
-
Table of contents (32 chapters)
Recommended for you

Bibliographic Information
- Bibliographic Information
-
- Book Title
- Applied Cryptography and Network Security
- Book Subtitle
- 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings
- Editors
-
- Jianying Zhou
- Moti Yung
- Series Title
- Security and Cryptology
- Series Volume
- 6123
- Copyright
- 2010
- Publisher
- Springer-Verlag Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- eBook ISBN
- 978-3-642-13708-2
- DOI
- 10.1007/978-3-642-13708-2
- Softcover ISBN
- 978-3-642-13707-5
- Edition Number
- 1
- Number of Pages
- XIII, 564
- Number of Illustrations
- 83 b/w illustrations
- Topics