Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings /

This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. Th...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Chow, Sherman S. M. (Επιμελητής έκδοσης), Liu, Joseph K. (Επιμελητής έκδοσης), Hui, Lucas C. K. (Επιμελητής έκδοσης), Yiu, Siu Ming (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2014.
Σειρά:Lecture Notes in Computer Science, 8782
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Paper
  • Password-Based Authenticated Key Exchange: An Overview
  • Practical and Provably Secure Attribute Based Encryption
  • Fundamental
  • Adaptive versus Static Security in the UC Model
  • Impossibility of Surjective Icart-Like Encodings
  • Symmetric Key Encryption
  • On the practical security bound of GF-NLFSR structure with SPN round function
  • Misuse-Resistant Variants of the OMD Authenticated Encryption Mode
  • A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function
  • Authentication.-Forward-Secure Sequential Aggregate Message Authentication Revisited: Formalization and a Provably Secure Scheme
  • A Provable Secure Batch Authentication Scheme for EPCGen2 Tags
  • Signatures
  • Generic Transformation to Strongly Existentially Unforgettable Signature Schemes with Leakage Resiliency
  • Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures
  • Protocol
  • Verifiable Computation in Multiparty Protocols with Honest Majority
  • Public Key Encryption
  • Lossy Trapdoor Relation and Its Application to Lossy Encryption and Adaptive Trapdoor Relation.-Compact Public Key Encryption with Minimum Ideal Property of Hash Functions
  • Proxy Re-Encryption
  • RCCA-Secure Multi-use Bidirectional Proxy Re-Encryption with Master Secret Security
  • Fine-grained Conditional Proxy Re-encryption and Application
  • Predicate Encryption
  • Constructing Subspace Membership Encryption through Inner Product Encryption
  • Efficient (Anonymous) Compact HIBE From Standard Assumptions
  • Attribute-based Cryptosystem
  • Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
  • Attribute-Based Signcryption : Signer Privacy, Strong Unforgetability and IND-CCA2 Security in Adaptive-Predicates Attack
  • Short Papers
  • How to Use Pseudorandom Generators in Unconditional Security Settings
  • Equivalence between MAC and PRF for Blockcipher based Constructions
  • A Short Fail-Stop Signature Scheme from Factoring
  • Computational Soundness of Asymmetric Bilinear Pairing-based Protocols
  • Timed-Release Computational Secret Sharing Scheme and Its Applications
  • Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage
  • Complete Robustness in Identity-Based Encryption.