Provable Security Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings /
This book constitutes the refereed proceedings of the Second International Conference on Provable Security, ProvSec 2008, held in Shanghai, China, October 30 - November 1, 2008. The 25 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2008.
|
Edición: | 1st ed. 2008. |
Colección: | Security and Cryptology ;
5324 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Encryption
- Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem
- Tweakable Pseudorandom Permutation from Generalized Feistel Structure
- Timed-Release Encryption Revisited
- Efficient and Provably Secure Certificateless Multi-receiver Signcryption
- A CCA Secure Hybrid Damgård's ElGamal Encryption
- Signature
- Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps
- Optimal Online/Offline Signature: How to Sign a Message without Online Computation
- Round-Optimal Blind Signatures from Waters Signatures
- Secure Proxy Multi-signature Scheme in the Standard Model
- Server-Aided Verification Signatures: Definitions and New Constructions
- Analysis
- On Proofs of Security for DAA Schemes
- Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005
- Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups
- On the Equivalence of Generic Group Models
- The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version
- Application of Hash Functions
- Leaky Random Oracle (Extended Abstract)
- How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions
- Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?
- Universal Composability
- Relationship of Three Cryptographic Channels in the UC Framework
- A Universally Composable Framework for the Analysis of Browser-Based Security Protocols
- Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library
- Universally Composable Security Analysis of TLS
- Round Optimal Universally Composable Oblivious Transfer Protocols
- Applications
- A Tamper-Evident Voting Machine Resistant to Covert Channels
- Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks.