Skip to main content
  • Conference proceedings
  • © 2015

Information Security and Cryptology

10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8957)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Inscrypt: International Conference on Information Security and Cryptology

Conference proceedings info: Inscrypt 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (29 papers)

  1. Front Matter

    Pages I-XIII
  2. Privacy and Anonymity

    1. Front Matter

      Pages 1-1
    2. An Efficient Privacy-Preserving E-coupon System

      • Weiwei Liu, Yi Mu, Guomin Yang
      Pages 3-15
    3. Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications

      • Paolo Palmieri, Luca Calderoni, Dario Maio
      Pages 16-36
  3. Multiparty and Outsource Computation

    1. Front Matter

      Pages 49-49
    2. Revocation in Publicly Verifiable Outsourced Computation

      • James Alderman, Christian Janson, Carlos Cid, Jason Crampton
      Pages 51-71
    3. Private Aggregation with Custom Collusion Tolerance

      • Constantinos Patsakis, Michael Clear, Paul Laird
      Pages 72-89
  4. Signature and Security Protocols

    1. Front Matter

      Pages 91-91
    2. A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC

      • Denisse Muñante Arzapalo, Vanea Chiprianov, Laurent Gallon, Philippe Aniorté
      Pages 150-169
    3. Optimal Proximity Proofs

      • Ioana Boureanu, Serge Vaudenay
      Pages 170-190
  5. Lattice and Public Key Cryptography

    1. Front Matter

      Pages 191-191
    2. Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions

      • Bei Liang, Rui Zhang, Hongda Li
      Pages 193-206
    3. Fully Homomorphic Encryption with Auxiliary Inputs

      • Fuqun Wang, Kunpeng Wang
      Pages 220-238
    4. Trapdoors for Ideal Lattices with Applications

      • Russell W. F. Lai, Henry K. F. Cheung, Sherman S. M. Chow
      Pages 239-256
  6. Block Cipher and Hash Function

    1. Front Matter

      Pages 257-257

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.

Editors and Affiliations

  • SKLOIS, Institute of Engineering, Chinese Academy of Sciences, Beijing, China

    Dongdai Lin

  • Computer Science Department, Columbia University, New York, USA

    Moti Yung

  • Infocomm Security Department, Institute for Infocomm Research, Singapore, Singapore

    Jianying Zhou

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access