Limit search to available items
Book Cover
E-book
Author ISC (Conference : Information security) (22nd : 2019 : New York, N.Y.)

Title Information security : 22nd international conference, ISC 2019, New York City, NY, USA, September 16-18, 2019 : proceedings / Zhiqiang Lin, Charalampos Papamanthou, Michalis Polychronakis (eds.)
Published Cham : Springer, [2019]
©2019

Copies

Description 1 online resource : illustrations (some color)
Series Lecture notes in computer science ; 11723
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 11723.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro; Preface; Organization; Contents; Attacks and Cryptanalysis; IBWH: An Intermittent Block Withholding Attack with Optimal Mining Reward Rate; 1 Introduction; 2 Related Work; 3 Preliminaries; 3.1 Block Withholding Attack; 3.2 Notations for the Reward Rate; 4 The Reward Rate of Block Withholding Attack Under Static Mining Power; 5 Intermittent Withholding Attack; 5.1 Reward Rate; 5.2 The Intermittent Block WithHolding (IBWH) Attack; 5.3 Discussion; 6 The Reward Rate of BWH and IBWH Under Dynamic Mining Power; 7 Evaluation; 8 Further Discussions
8.1 The Reward Rate of Fork After Withholding8.2 The Reward Rate of Selfish Mining; 9 Conclusion; References; Full Database Reconstruction with Access and Search Pattern Leakage; 1 Introduction; 1.1 Organization of the Paper; 1.2 Contributions; 2 Model and Problem Statement; 3 Related Work; 3.1 Context; 3.2 Previous Results; 4 Full Ordering Reconstruction; 4.1 Approach; 4.2 Algorithm; 4.3 Query Complexity Analysis; 4.4 Lower Bound; 4.5 Dense Databases; 4.6 Databases with Special Properties; 5 Full Database Reconstruction; 5.1 Example; 5.2 Algorithm; 5.3 Analysis; 6 Conclusions; References
Cube Cryptanalysis of Round-Reduced ACORN1 Introduction; 1.1 Our Contributions; 2 Preliminaries; 2.1 Cube Attacks and Cube Testers; 2.2 Numeric Mapping; 2.3 Mixed Integer Linear Programming; 2.4 Bit-Based Division Property and MILP Representation; 2.5 Bit-Based Division Property and Cube Attack; 3 A Brief Description of ACORN; 4 A New Method to Search Good Cube Testers; 4.1 Greedy Algorithm for Finding Cube Testers; 4.2 Accelerating the Greedy Algorithm via Numeric Mapping; 4.3 Applications to ACORN; 5 Searching Cubes in Division Property Based Cube Attack
5.1 Finding Cube Testers via Division Property Based Cube Attack5.2 Finding Cubes for Key Recovery Attacks; 5.3 Applications to ACORN; 6 Conclusions; A KSG128(t) and FBK128(t); B Proof of Theorem1; C Cube Testers of Different Dimensions; D Embedded Property; References; Crypto I: Secure Computation and Storage; Auditable Compressed Storage; 1 Introduction; 2 Background; 2.1 Compression Algorithms; 2.2 Related Work; 3 Model and Security Guarantees; 3.1 System Model; 3.2 Adversarial Model; 3.3 Security Guarantees; 4 Auditable Compressed Storage; 4.1 ACS-RLE Scheme; 4.2 ACS-HUFF Scheme
4.3 Differences Between ACS-RLE and ACS-HUFF5 Analysis; 5.1 Security; 5.2 Performance; 6 Conclusion; References; Decentralized Evaluation of Quadratic Polynomials on Encrypted Data; 1 Introduction; 1.1 Technical Contribution; 1.2 Applications; 2 Preliminaries; 2.1 Notations; 2.2 Bilinear Group Setting; 2.3 Computational Assumption; 2.4 Security Notions; 3 Encryption for Quadratic Polynomial Evaluation; 3.1 Freeman's Framework; 3.2 Optimized Version; 3.3 Security Properties; 4 Decentralized Homomorphic Encryption; 4.1 Decentralized Key Generation; 4.2 Distributed Decryption
Summary This book constitutes the proceedings of the 22nd International Conference on Information Security, ISC 2019, held in New York City, NY, USA, in September 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 86 submissions. The papers were organized in topical sections named: Attacks and Cryptanalysis; Crypto I: Secure Computation and Storage; Machine Learning and Security; Crypto II: Zero-Knowledge Proofs; Defenses; Web Security; Side Channels; Malware Analysis; Crypto III: Signatures and Authentication. -- Provided by publisher
Notes Includes author index
Online resource; title from PDF title page (SpringerLink, viewed September 16, 2019)
Subject Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer security
Data encryption (Computer science)
Genre/Form Electronic books
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Lin, Zhiqiang, editor
Papamanthou, Charalampos, editor
Polychronakis, Michalis (Computer scientist), editor.
ISBN 9783030302153
3030302156
3030302148
9783030302146
9783030302160
3030302164