Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings /
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. Th...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2014.
|
Σειρά: | Lecture Notes in Computer Science,
8782 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Paper
- Password-Based Authenticated Key Exchange: An Overview
- Practical and Provably Secure Attribute Based Encryption
- Fundamental
- Adaptive versus Static Security in the UC Model
- Impossibility of Surjective Icart-Like Encodings
- Symmetric Key Encryption
- On the practical security bound of GF-NLFSR structure with SPN round function
- Misuse-Resistant Variants of the OMD Authenticated Encryption Mode
- A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function
- Authentication.-Forward-Secure Sequential Aggregate Message Authentication Revisited: Formalization and a Provably Secure Scheme
- A Provable Secure Batch Authentication Scheme for EPCGen2 Tags
- Signatures
- Generic Transformation to Strongly Existentially Unforgettable Signature Schemes with Leakage Resiliency
- Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures
- Protocol
- Verifiable Computation in Multiparty Protocols with Honest Majority
- Public Key Encryption
- Lossy Trapdoor Relation and Its Application to Lossy Encryption and Adaptive Trapdoor Relation.-Compact Public Key Encryption with Minimum Ideal Property of Hash Functions
- Proxy Re-Encryption
- RCCA-Secure Multi-use Bidirectional Proxy Re-Encryption with Master Secret Security
- Fine-grained Conditional Proxy Re-encryption and Application
- Predicate Encryption
- Constructing Subspace Membership Encryption through Inner Product Encryption
- Efficient (Anonymous) Compact HIBE From Standard Assumptions
- Attribute-based Cryptosystem
- Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Attribute-Based Signcryption : Signer Privacy, Strong Unforgetability and IND-CCA2 Security in Adaptive-Predicates Attack
- Short Papers
- How to Use Pseudorandom Generators in Unconditional Security Settings
- Equivalence between MAC and PRF for Blockcipher based Constructions
- A Short Fail-Stop Signature Scheme from Factoring
- Computational Soundness of Asymmetric Bilinear Pairing-based Protocols
- Timed-Release Computational Secret Sharing Scheme and Its Applications
- Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage
- Complete Robustness in Identity-Based Encryption.