Cargando…

Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings /

This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009. The 19 revised full papers and two invited talks presented were carefully reviewed and selected from 64 submissions. The papers are...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Pieprzyk, Josef Pawel (Editor ), Zhang, Fangguo (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Security and Cryptology ; 5848
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Invited Talks
  • A Brief History of Security Models for Confidentiality
  • Symbolic Methods for Provable Security
  • Encryption
  • Efficient Non-interactive Universally Composable String-Commitment Schemes
  • Spatial Encryption under Simpler Assumption
  • Chosen-Ciphertext Secure RSA-Type Cryptosystems
  • Anonymous Conditional Proxy Re-encryption without Random Oracle
  • Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
  • Digital Signatures
  • Identity-Based Verifiably Encrypted Signatures without Random Oracles
  • How to Prove Security of a Signature with a Tighter Security Reduction
  • Twin Signature Schemes, Revisited
  • On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions
  • Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?
  • Anonymous Signatures Revisited
  • Cryptographic Protocols
  • An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles
  • Password Authenticated Key Exchange Based on RSA in the Three-Party Settings
  • Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols
  • Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge
  • Server-Controlled Identity-Based Authenticated Key Exchange
  • Reductions and Privacy
  • Oracle Separation in the Non-uniform Model
  • GUC-Secure Set-Intersection Computation
  • Self-enforcing Private Inference Control.