By Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis

ISBN-10: 3319122797

ISBN-13: 9783319122793

ISBN-10: 3319122800

ISBN-13: 9783319122809

This publication constitutes the refereed complaints of the thirteenth foreign convention on Cryptology and community protection, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised complete papers provided including the abstracts of three invited talks have been conscientiously reviewed and chosen from 86 submissions. The papers conceal issues of curiosity reminiscent of encryption; cryptanalysis; malware research; and privateness and identity structures in addition to a variety of varieties of community protocol layout and research work.

Show description

Read Online or Download Cryptology and Network Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings PDF

Similar international_1 books

Download PDF by Cesare Celozzi, Filippo Gandino, Maurizio Rebaudengo: Sensor Systems and Software: 4th International ICST

This booklet constitutes the completely refereed post-conference court cases of the 4th foreign ICST convention on Sensor platforms and software program, S-Cube 2013, held in Lucca, Italy, 2013. The eight revised complete papers and a couple of invited papers awarded conceal contributions on varied applied sciences for instant sensor networks, together with safeguard protocols, middleware, research instruments and frameworks.

Exchange Rates, Prices and World Trade: New Methods, - download pdf or read online

This publication offers a scientific remedy of the interplay among nationwide cost degrees and alternate charges, and the formation of expectation relating to alternate premiums on alternate flows. The thrust is empirical and the examine is made from 5 self-contained chapters with a standard subject matter, viz. , the behaviour of costs and amounts in overseas items and fiscal markets.

Download e-book for iPad: International Tourism: An Economic Perspective by François Vellas

It is a textual content for college students of foreign tourism at HND and undergraduate point. It seems to be at a couple of points of tourism: marketplace traits and forecasts, the commercial impression of tourism, the position of selling and finance, firms and guidelines. foreign situations are used in the course of the textual content.

Extra info for Cryptology and Network Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings

Example text

1 A CCA Secure Extension We extend the SI scheme to a CCA secure construction using the technique of Zhang et al. [23]. We denote the following PRE scheme by SII. Setup(λ) : Let λ be the security parameter, G and GT be groups of prime order p, and e: G × G → GT be a bilinear map. Randomly choose g1 , g2 , h1 , h2 ← G and compute L = e(h1 , h2 ). Let H0 : {0, 1}l × G → Z∗p be a collision-resistant hash function, H1 : GT → {0, 1}l1 be a collision-resistant and one-way hash function and H2 : GT → {0, 1}l2 be a universal hash function, where l = l1 + l2 and l < log p such that the generalized leftover hash lemma holds [11] in respect to negl(λ) for security.

2) If the above relation does not hold, return “⊥ . Otherwise, parse c0 = τ1 ||τ2 , z compute K = c2 /e(h1 , c1 j ). If τ1 = H1 (K), return m = τ2 ⊕ H2 (K), else return “⊥ . Dec2 (ski , Ci ) : Given a secret key ski and a 2nd level ciphertext Ci , compute ψ = H0 (c0 , c1 ) and check the relations (1). If the relations do not hold, return “⊥ . 1/x Otherwise, parse c0 = τ1 ||τ2 and compute K = e(c3 i , h2 ). If τ1 = H1 (K), return m = τ2 ⊕ H2 (K), else return “⊥ . We omit the correctness of SII due to the space limit.

Our work is making efforts to address this issue. 1 Related Work Libert and Vergnaud [17] proposed traceable proxy re-encryption. A PRE scheme is traceable if any set of proxies colluding with delegatees is unable to generate a new re-encryption key that cannot be traced back to one of them. They also presented a traceable PRE scheme of which the size of both the public/secret key and the ciphertext depend on the number of the delegatees. Hayashi et al. [13] introduced the strong unforgeability of re-encryption keys against collusion attacks (sUFReKey-CA) and proposed PRE constructions aiming at achieving sUFReKey-CA under two variants of the Diffie-Hellman inversion assumption.

Download PDF sample

Cryptology and Network Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings by Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis


by Christopher
4.4

Rated 4.89 of 5 – based on 4 votes