Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings /

This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009. The 19 revised full papers and two invited talks presented were carefully reviewed and selected from 64 submissions. The papers are...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Pieprzyk, Josef (Editor), Zhang, Fangguo (Editor)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2009.
Series:Lecture Notes in Computer Science, 5848
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Invited Talks
  • A Brief History of Security Models for Confidentiality
  • Symbolic Methods for Provable Security
  • Encryption
  • Efficient Non-interactive Universally Composable String-Commitment Schemes
  • Spatial Encryption under Simpler Assumption
  • Chosen-Ciphertext Secure RSA-Type Cryptosystems
  • Anonymous Conditional Proxy Re-encryption without Random Oracle
  • Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
  • Digital Signatures
  • Identity-Based Verifiably Encrypted Signatures without Random Oracles
  • How to Prove Security of a Signature with a Tighter Security Reduction
  • Twin Signature Schemes, Revisited
  • On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions
  • Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?
  • Anonymous Signatures Revisited
  • Cryptographic Protocols
  • An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles
  • Password Authenticated Key Exchange Based on RSA in the Three-Party Settings
  • Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols
  • Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge
  • Server-Controlled Identity-Based Authenticated Key Exchange
  • Reductions and Privacy
  • Oracle Separation in the Non-uniform Model
  • GUC-Secure Set-Intersection Computation
  • Self-enforcing Private Inference Control.