LEADER 09436nam 2200553 450 001 996464420203316 005 20231110213136.0 010 $a3-030-80851-3 035 $a(CKB)4100000011976349 035 $a(MiAaPQ)EBC6661651 035 $a(Au-PeEL)EBL6661651 035 $a(OCoLC)1259594026 035 $a(PPN)258304480 035 $a(EXLCZ)994100000011976349 100 $a20220321d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aApplied cryptography in computer and communications $efirst EAI International Conference, AC3 2021, virtual event, May 15-16, 2021, proceedings /$fBo Chen, Xinyi Huang (editors) 210 1$aCham, Switzerland :$cSpringer,$d[2021] 210 4$d©2021 215 $a1 online resource (216 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;$vv.386 311 $a3-030-80850-5 327 $aIntro -- Preface -- Organization -- Contents -- Blockchain -- Anchor: An NDN-Based Blockchain Network -- 1 Introduction -- 2 Our Design -- 2.1 Random Anchor Selection -- 2.2 Two-Layer Cascaded NDN Design -- 2.3 Elimination of Duplicated Transmissions from Multiple Anchors -- 3 Performance Evaluation -- 4 Conclusion -- References -- An Identity-Based Blind Signature and Its Application for Privacy Preservation in Bitcoin -- 1 Introduction -- 2 Preliminaries -- 2.1 Tate Bilinear Pairings -- 2.2 Computational Diffie-Hellman Assumption -- 2.3 System Model -- 3 Review of Sarde et al.' Blind Signature Scheme -- 4 Attack on Sarde et al.' Blind Signature Scheme -- 5 Unlinkable ID-Based Blind Signature Scheme -- 6 Unlinkable ID-Based Proxy Blind Signature Scheme -- 7 Security Analysis -- 7.1 Analysis of Blind Signature -- 7.2 Analysis of Proxy Blind Signature -- 8 Performance Analysis and Comparison -- 9 Application for Privacy Preservation in Bitcoin -- References -- Blockchain-Based Sealed-Bid Domain Name Auction Protocol -- 1 Introduction -- 2 Models and Design Goals -- 2.1 System Model -- 2.2 Security Model -- 2.3 Design Goal -- 3 Preliminaries -- 3.1 Account-Based Consortium Blockchain -- 3.2 Auction Types -- 3.3 Pedersen Commitment -- 3.4 Zero-Knowledge Proof -- 4 Our Proposal -- 4.1 Create the Auction -- 4.2 Commit the Bid -- 4.3 Reveal the Bid -- 4.4 Close the Auction -- 5 Analysis of Our Proposal -- 5.1 Security Analysis -- 5.2 Performance Evaluation -- 6 Related Work -- 6.1 Blockchain-Based DNS -- 6.2 Blockchain-Based Auction -- 7 Conclusion -- References -- Authentication -- A Security Enhanced Key Management Service for ARM Pointer Authentication -- 1 Introduction -- 2 Background -- 2.1 Privilege and Exception Levels -- 2.2 Pointer Authentication -- 3 Threat Model -- 3.1 Attacks -- 3.2 Assumptions -- 4 Design -- 4.1 Architecture. 327 $a4.2 Algorithm -- 5 Implementation -- 5.1 EL3 Runtime Service -- 5.2 EL1 Kernel Module -- 5.3 EL0 Calling Convention -- 6 Evaluation -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 7 Related Works -- 8 Conclusion -- References -- Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control System -- 1 Introduction -- 1.1 Threat Model -- 1.2 Related Works -- 1.3 Motivation and Contribution -- 1.4 Notations -- 1.5 Paper Organization -- 2 Review of Chatterjee et al.'s Scheme -- 2.1 System Initialization and Registration Phase -- 2.2 Authentication and Key Agreement Phase -- 3 Cryptanalysis of Chatterjee et al.'s Scheme -- 4 The Proposed Scheme -- 4.1 Pre-deployment Phase -- 4.2 User Registration Phase -- 4.3 Login and Authentication Phase -- 5 Security Analysis -- 5.1 BAN-Logic Based Proof of Authentication -- 5.2 Further Security Analysis -- 6 Performance Evaluation -- 6.1 Security Features -- 6.2 Computational Overhead -- 7 Conclusion and Future Work -- References -- Secure Computation -- Efficient and Private Divisible Double Auction in Trusted Execution Environment -- 1 Introduction -- 2 Divisible Double Auction -- 2.1 Models -- 2.2 Auction Properties -- 3 Mechanism Design -- 4 ETA System Design -- 4.1 SGX Formalization -- 4.2 ETA System -- 4.3 ETA Execution Program -- 4.4 Threat Model -- 4.5 Security Analysis -- 5 Experiments -- 5.1 ETA Performance Evaluation -- 5.2 Case Study -- 6 Related Work -- 7 Conclusion -- References -- Parallel Implementation and Optimization of SM4 Based on CUDA -- 1 Introduction -- 2 Preliminaries -- 2.1 CUDA -- 2.2 A Brief Description of SM4 -- 3 Parallel Design of SM4 -- 4 Experiment and Discussion -- 4.1 Basic Experiment -- 4.2 Performance Optimization -- 4.3 Analysis of Results -- 5 Conclusion -- References -- Another Algebraic Decomposition Method for Masked Implementation. 327 $a1 Introduction -- 2 Preliminaries -- 2.1 Functions over Finite Fields -- 3 Algebraic Decomposition -- 3.1 Algebraic Decomposition Using GM Polynomials -- 3.2 Experimental Result -- 4 Application to Masking -- 5 Conclusion -- A Masking for Quadratic Polynomial -- References -- Practical Crypto Application -- Concealed Communication in Online Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Privacy Analysis in Online Social Networks -- 2.2 Privacy Leakages -- 2.3 Privacy-Preserving Online Social Networks -- 2.4 Mix Networks -- 3 Proposed Protocols -- 3.1 A Concealed Secure Channel -- 3.2 User Information and Postings -- 3.3 Personal Messages and Group Messages -- 3.4 Groups -- 3.5 Finding and Verifying Participants, Exchanging Keys -- 3.6 Key Revocation -- 3.7 User Registration -- 4 Privacy Analysis -- 4.1 Attacker Model -- 4.2 Structure of Network (NS) -- 4.3 Structure of Data (DS) -- 4.4 Timing (T) -- 4.5 Control Information (CI) -- 5 Performance Analysis -- 6 Conclusions -- References -- MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devices -- 1 Introduction -- 2 Background -- 2.1 Wearable Mobile Devices -- 2.2 Plausibly Deniable Encryption -- 2.3 Image Steganography -- 2.4 Digital Watermarking -- 2.5 Peak Signal-to-Noise Ratio (PSNR) -- 3 Model and Assumptions -- 3.1 System Model -- 3.2 Adversarial Model -- 4 Design -- 4.1 Design Rationale -- 4.2 Design Details -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Evaluation -- 6 Security Analysis and Discussion -- 6.1 Security Analysis -- 6.2 Discussion -- 7 Related Work -- 7.1 Plausibly Deniable Encryption Systems -- 7.2 Image Steganograyphy -- 8 Conclusion -- References -- Recent Advances in the Web PKI and the Technical Challenges in SCMS -- 1 Introduction -- 2 Recent Advances in the Web PKI -- 2.1 Certificate Transparency. 327 $a2.2 Push-Based Certificate Revocation -- 3 The Technical Challenges in SCMS -- 3.1 The Expected Properties of V2V PKI Systems -- 3.2 SCMS -- 3.3 Technical Challenge #1: Certificate Transparency vs. Pseudonym Certificate -- 3.4 Technical Challenge #2: Push-Based Certificate Revocation vs. the Great Volume of Pseudonym Certificates -- 4 Conclusions -- References -- The First International Workshop on Security for Internet of Things (IOTS 2021) -- A Novel Approach for Code Smells Detection Based on Deep Leaning -- 1 Introduction -- 2 Code Smells Detection Based on Convolutional Networks -- 3 High Level Design -- 3.1 Experiments Results -- 4 Conclusion -- References -- A Thieves Identification Scheme for Prepaid Systems in Smart Grids -- 1 Introduction -- 2 Related Work -- 3 The Framework -- 3.1 Network Model -- 3.2 Security Requirements -- 4 Our Proposed Approach -- 4.1 Setup -- 4.2 Joining -- 4.3 Power Purchasing -- 4.4 Power Requesting -- 4.5 Identification -- 5 Conclusion -- References -- Using Smart Contracts to Improve Searchable Symmetric Encryption -- 1 Introduction -- 2 Notations -- 3 Preliminaries -- 3.1 Scheme of Searchable Symmetric Encryption -- 3.2 Smart Contract -- 4 Scheme of the Integrity Verification of Search Results -- 4.1 Merkle Tree -- 4.2 Proof of Integrity Verification of Search Results -- 5 Smart Contract Based Searchable Symmetric Encryption -- 5.1 Scheme of Smart Contract Based SSE -- 5.2 Details of Smart Contract Based SSE Scheme -- 6 Security and Performance Analyses -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 6.3 Experimental Analysis -- 7 Conclusion -- References -- Towards the Adaptability of Traffic-Based IoT Security Management Systems to the Device Behavior Evolutions -- 1 Introduction -- 2 IoT Security Management Systems -- 3 IoT Device Behavior Evolutions -- 4 Possible Solutions -- 5 Conclusion. 327 $aReferences -- Author Index. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 606 $aData encryption (Computer science)$vCongresses 606 $aTelecommunication systems$xSecurity measures$vCongresses 606 $aInternet of things$xSecurity measures$vCongresses 606 $aHuang, Xinyi$veditor 615 0$aData encryption (Computer science) 615 0$aTelecommunication systems$xSecurity measures 615 0$aInternet of things$xSecurity measures 615 0$aHuang, Xinyi 676 $a005.82 702 $aChen$b Bo 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996464420203316 996 $aApplied cryptography in computer and communications$92814404 997 $aUNISA