Fr. 70.00

Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem.

List of contents

Invited Paper.- Password-Based Authenticated Key Exchange: An Overview.- Practical and Provably Secure Attribute Based Encryption.- Fundamental.- Adaptive versus Static Security in the UC Model.- Impossibility of Surjective Icart-Like Encodings.- Symmetric Key Encryption.- On the practical security bound of GF-NLFSR structure with SPN round function.- Misuse-Resistant Variants of the OMD Authenticated Encryption Mode.- A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function.- Authentication.-Forward-Secure Sequential Aggregate Message Authentication Revisited: Formalization and a Provably Secure Scheme.- A Provable Secure Batch Authentication Scheme for EPCGen2 Tags.- Signatures.- Generic Transformation to Strongly Existentially Unforgettable Signature Schemes with Leakage Resiliency.- Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures.- Protocol.- Verifiable Computation in Multiparty Protocols with Honest Majority.- Public Key Encryption.- Lossy Trapdoor Relation and Its Application to Lossy Encryption and Adaptive Trapdoor Relation.-Compact Public Key Encryption with Minimum Ideal Property of Hash Functions.- Proxy Re-Encryption.- RCCA-Secure Multi-use Bidirectional Proxy Re-Encryption with Master Secret Security.- Fine-grained Conditional Proxy Re-encryption and Application.- Predicate Encryption.- Constructing Subspace Membership Encryption through Inner Product Encryption.- Efficient (Anonymous) Compact HIBE From Standard Assumptions.- Attribute-based Cryptosystem.- Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.- Attribute-Based Signcryption : Signer Privacy, Strong Unforgetability and IND-CCA2 Security in Adaptive-Predicates Attack.- Short Papers.- How to Use Pseudorandom Generators in Unconditional Security Settings.- Equivalence between MAC and PRF for Blockcipher based Constructions.- A Short Fail-Stop Signature Scheme from Factoring.- Computational Soundness of Asymmetric Bilinear Pairing-based Protocols.- Timed-Release Computational Secret Sharing Scheme and Its Applications.- Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage.- Complete Robustness in Identity-Based Encryption.

Product details

Assisted by Lucas C K Hui et al (Editor), Sherman S. M. Chow (Editor), Sherman S.M. Chow (Editor), Lucas C. K. Hui (Editor), Lucas C.K. Hui (Editor), Josep K Liu (Editor), Joseph K Liu (Editor), Joseph K. Liu (Editor), Siu Ming Yiu (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 01.01.2014
 
EAN 9783319124742
ISBN 978-3-31-912474-2
No. of pages 351
Dimensions 159 mm x 234 mm x 12 mm
Weight 564 g
Illustrations XVIII, 351 p. 41 illus.
Series Lecture Notes in Computer Science
Security and Cryptology
Lecture Notes in Computer Science / Security and Cryptology
Lecture Notes in Computer Science
Security and Cryptology
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

Computersicherheit, C, Netzwerksicherheit, Wirtschaftsmathematik und -informatik, IT-Management, Kryptografie, Verschlüsselungstechnologie, computer science, Public Administration, Systems and Data Security, Data and Information Security, Computers and Society, Management of Computing and Information Systems, IT Operations, Application software, Maintenance & repairs, information architecture, Network Security, Ethical & social aspects of IT, Computer security, Computers and civilization, Management information systems, Information technology: general issues, Computer Appl. in Administrative Data Processing, Data encryption, Data encryption (Computer science), Cryptology, Computer Application in Administrative Data Processing

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.