LEADER 05847nam 22007575 450 001 996465498703316 005 20200707022249.0 010 $a3-642-32928-4 024 7 $a10.1007/978-3-642-32928-9 035 $a(CKB)3400000000085790 035 $a(SSID)ssj0000746123 035 $a(PQKBManifestationID)11418635 035 $a(PQKBTitleCode)TC0000746123 035 $a(PQKBWorkID)10860387 035 $a(PQKB)11498484 035 $a(DE-He213)978-3-642-32928-9 035 $a(MiAaPQ)EBC3070609 035 $a(PPN)168323095 035 $a(EXLCZ)993400000000085790 100 $a20120830d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity and Cryptography for Networks$b[electronic resource] $e8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012, Proceedings /$fedited by Ivan Visconti, Roberto De Prisco 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XI, 582 p. 75 illus.) 225 1 $aSecurity and Cryptology ;$v7485 300 $aInternational conference proceedings. 311 $a3-642-32927-6 320 $aIncludes bibliographical references and author index. 327 $aDeterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting -- Ring Switching in BGV-Style Homomorphic Encryption -- Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions -- Fully Anonymous Attribute Tokens from Lattices -- Efficient Structure-Preserving Signature Scheme from Standard Assumptions -- Compact Round-Optimal Partially-Blind Signatures -- History-Free Sequential Aggregate Signatures -- A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN -- Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness -- Decentralized Dynamic Broadcast Encryption -- Time-Specific Encryption from Forward-Secure Encryption -- Efficient Two-Party and Multi-Party Computation Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits -- 5PM: Secure Pattern Matching -- Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol -- On the Centrality of Off-Line E-Cash to Concrete Partial Information Games -- Universally Composable Security with Local Adversaries -- On the Strength Comparison of the ECDLP and the IFP -- New Attacks for Knapsack Based Cryptosystems -- Multiple Differential Cryptanalysis Using LLR and ?2 Statistics -- Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings -- Homomorphic Encryption for Multiplications and Pairing Evaluation -- Publicly Verifiable Ciphertexts -- Public-Key Encryption with Lazy Parties -- Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation -- MAC Aggregation with Message Multiplicity -- Efficiency Limitations of ?-Protocols for Group Homomorphisms Revisited -- A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument -- Active Security in Multiparty Computation over Black-Box Groups -- Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output -- Human Perfectly Secure Message Transmission Protocols and Their Applications -- Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption. 330 $aThis book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners. 410 0$aSecurity and Cryptology ;$v7485 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aApplication software 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Appl. in Administrative Data Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/I2301X 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aApplication software. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Appl. in Administrative Data Processing. 676 $a005.82 702 $aVisconti$b Ivan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDe Prisco$b Roberto$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aSCN 2012 906 $aBOOK 912 $a996465498703316 996 $aSecurity and Cryptography for Networks$9774029 997 $aUNISA