Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings

This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010. The 17 papers presented were carefully reviewed and selected from 47 submissions. The papers are divided in topical sections on identification, auto proofs, signature, hash functi...

Full description

Bibliographic Details
Other Authors: Kurosawa, Kaoru (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2010, 2010
Edition:1st ed. 2010
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03256nmm a2200409 u 4500
001 EB000385479
003 EBX01000000000000000238531
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9783642162800 
100 1 |a Kurosawa, Kaoru  |e [editor] 
245 0 0 |a Provable Security  |h Elektronische Ressource  |b 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings  |c edited by Kaoru Kurosawa 
250 |a 1st ed. 2010 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2010, 2010 
300 |a X, 279 p. 26 illus  |b online resource 
505 0 |a Identification -- Improved Zero-Knowledge Identification with Lattices -- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks -- Auto Proofs -- A Calculus for Game-Based Security Proofs -- Automating Computational Proofs for Public-Key-Based Key Exchange -- Signature I -- A Framework for Constructing Convertible Undeniable Signatures -- Efficient Confirmer Signatures from the “Signature of a Commitment” Paradigm -- Hash Function -- Collision Resistant Double-Length Hashing -- Interpreting Hash Function Security Proofs -- Protocol -- Formal and Precise Analysis of Soundness of Several Shuffling Schemes -- Distinguishing Distributions Using Chernoff Information -- Signature II -- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) -- An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation -- Invited Talk -- Cryptographic Protocols from Lattices -- Encryption -- A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication -- Efficient Broadcast Encryption with Personalized Messages -- Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption -- Signcryption -- Identity Based Public Verifiable Signcryption Scheme -- Fully Secure Threshold Unsigncryption 
653 |a Computer Communication Networks 
653 |a User interfaces (Computer systems) 
653 |a Cryptography 
653 |a Algorithms 
653 |a Electronic data processing / Management 
653 |a Computer networks  
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Data and Information Security 
653 |a User Interfaces and Human Computer Interaction 
653 |a Human-computer interaction 
653 |a IT Operations 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-642-16280-0 
856 4 0 |u https://doi.org/10.1007/978-3-642-16280-0?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 5,824 
520 |a This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010. The 17 papers presented were carefully reviewed and selected from 47 submissions. The papers are divided in topical sections on identification, auto proofs, signature, hash function, protocol, encryption, and signcryption