Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings /

This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009. The 19 revised full papers and two invited talks presented were carefully reviewed and selected from 64 submissions. The papers are...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Pieprzyk, Josef (Επιμελητής έκδοσης), Zhang, Fangguo (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2009.
Σειρά:Lecture Notes in Computer Science, 5848
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Talks
  • A Brief History of Security Models for Confidentiality
  • Symbolic Methods for Provable Security
  • Encryption
  • Efficient Non-interactive Universally Composable String-Commitment Schemes
  • Spatial Encryption under Simpler Assumption
  • Chosen-Ciphertext Secure RSA-Type Cryptosystems
  • Anonymous Conditional Proxy Re-encryption without Random Oracle
  • Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
  • Digital Signatures
  • Identity-Based Verifiably Encrypted Signatures without Random Oracles
  • How to Prove Security of a Signature with a Tighter Security Reduction
  • Twin Signature Schemes, Revisited
  • On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions
  • Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?
  • Anonymous Signatures Revisited
  • Cryptographic Protocols
  • An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles
  • Password Authenticated Key Exchange Based on RSA in the Three-Party Settings
  • Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols
  • Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge
  • Server-Controlled Identity-Based Authenticated Key Exchange
  • Reductions and Privacy
  • Oracle Separation in the Non-uniform Model
  • GUC-Secure Set-Intersection Computation
  • Self-enforcing Private Inference Control.