Description |
1 online resource : illustrations (some color) |
Series |
Lecture notes in computer science ; 11723 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 11723.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Intro; Preface; Organization; Contents; Attacks and Cryptanalysis; IBWH: An Intermittent Block Withholding Attack with Optimal Mining Reward Rate; 1 Introduction; 2 Related Work; 3 Preliminaries; 3.1 Block Withholding Attack; 3.2 Notations for the Reward Rate; 4 The Reward Rate of Block Withholding Attack Under Static Mining Power; 5 Intermittent Withholding Attack; 5.1 Reward Rate; 5.2 The Intermittent Block WithHolding (IBWH) Attack; 5.3 Discussion; 6 The Reward Rate of BWH and IBWH Under Dynamic Mining Power; 7 Evaluation; 8 Further Discussions |
|
8.1 The Reward Rate of Fork After Withholding8.2 The Reward Rate of Selfish Mining; 9 Conclusion; References; Full Database Reconstruction with Access and Search Pattern Leakage; 1 Introduction; 1.1 Organization of the Paper; 1.2 Contributions; 2 Model and Problem Statement; 3 Related Work; 3.1 Context; 3.2 Previous Results; 4 Full Ordering Reconstruction; 4.1 Approach; 4.2 Algorithm; 4.3 Query Complexity Analysis; 4.4 Lower Bound; 4.5 Dense Databases; 4.6 Databases with Special Properties; 5 Full Database Reconstruction; 5.1 Example; 5.2 Algorithm; 5.3 Analysis; 6 Conclusions; References |
|
Cube Cryptanalysis of Round-Reduced ACORN1 Introduction; 1.1 Our Contributions; 2 Preliminaries; 2.1 Cube Attacks and Cube Testers; 2.2 Numeric Mapping; 2.3 Mixed Integer Linear Programming; 2.4 Bit-Based Division Property and MILP Representation; 2.5 Bit-Based Division Property and Cube Attack; 3 A Brief Description of ACORN; 4 A New Method to Search Good Cube Testers; 4.1 Greedy Algorithm for Finding Cube Testers; 4.2 Accelerating the Greedy Algorithm via Numeric Mapping; 4.3 Applications to ACORN; 5 Searching Cubes in Division Property Based Cube Attack |
|
5.1 Finding Cube Testers via Division Property Based Cube Attack5.2 Finding Cubes for Key Recovery Attacks; 5.3 Applications to ACORN; 6 Conclusions; A KSG128(t) and FBK128(t); B Proof of Theorem1; C Cube Testers of Different Dimensions; D Embedded Property; References; Crypto I: Secure Computation and Storage; Auditable Compressed Storage; 1 Introduction; 2 Background; 2.1 Compression Algorithms; 2.2 Related Work; 3 Model and Security Guarantees; 3.1 System Model; 3.2 Adversarial Model; 3.3 Security Guarantees; 4 Auditable Compressed Storage; 4.1 ACS-RLE Scheme; 4.2 ACS-HUFF Scheme |
|
4.3 Differences Between ACS-RLE and ACS-HUFF5 Analysis; 5.1 Security; 5.2 Performance; 6 Conclusion; References; Decentralized Evaluation of Quadratic Polynomials on Encrypted Data; 1 Introduction; 1.1 Technical Contribution; 1.2 Applications; 2 Preliminaries; 2.1 Notations; 2.2 Bilinear Group Setting; 2.3 Computational Assumption; 2.4 Security Notions; 3 Encryption for Quadratic Polynomial Evaluation; 3.1 Freeman's Framework; 3.2 Optimized Version; 3.3 Security Properties; 4 Decentralized Homomorphic Encryption; 4.1 Decentralized Key Generation; 4.2 Distributed Decryption |
Summary |
This book constitutes the proceedings of the 22nd International Conference on Information Security, ISC 2019, held in New York City, NY, USA, in September 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 86 submissions. The papers were organized in topical sections named: Attacks and Cryptanalysis; Crypto I: Secure Computation and Storage; Machine Learning and Security; Crypto II: Zero-Knowledge Proofs; Defenses; Web Security; Side Channels; Malware Analysis; Crypto III: Signatures and Authentication. -- Provided by publisher |
Notes |
Includes author index |
|
Online resource; title from PDF title page (SpringerLink, viewed September 16, 2019) |
Subject |
Computer security -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
Electronic books
|
|
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Lin, Zhiqiang, editor
|
|
Papamanthou, Charalampos, editor
|
|
Polychronakis, Michalis (Computer scientist), editor.
|
ISBN |
9783030302153 |
|
3030302156 |
|
3030302148 |
|
9783030302146 |
|
9783030302160 |
|
3030302164 |
|