Provable and Practical Security 15th International Conference, ProvSec 2021, Guangzhou, China, November 5–8, 2021, Proceedings

This book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in November 2021. The 21 full papers presented were carefully reviewed and selected from 67 submissions. The papers focus on provable security as an essen...

Full description

Bibliographic Details
Other Authors: Huang, Qiong (Editor), Yu, Yu (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2021, 2021
Edition:1st ed. 2021
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03489nmm a2200361 u 4500
001 EB002006016
003 EBX01000000000000001168916
005 00000000000000.0
007 cr|||||||||||||||||||||
008 211203 ||| eng
020 |a 9783030904029 
100 1 |a Huang, Qiong  |e [editor] 
245 0 0 |a Provable and Practical Security  |h Elektronische Ressource  |b 15th International Conference, ProvSec 2021, Guangzhou, China, November 5–8, 2021, Proceedings  |c edited by Qiong Huang, Yu Yu 
250 |a 1st ed. 2021 
260 |a Cham  |b Springer International Publishing  |c 2021, 2021 
300 |a XIII, 393 p. 70 illus., 30 illus. in color  |b online resource 
505 0 |a Searchable Encryption -- Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control -- Improved Security Model for Public-key Authenticated Encryption with Keyword Search -- Public Key Encryption with Fuzzy Matching -- Partitioned Searchable Encryption -- Key Exchange & Zero Knowledge Proof -- Key Exposure Resistant Group Key Agreement Protocol -- NIKE from Affine Determinant Programs -- OrBit: OR-Proof Identity-Based Identification with Tight Security for (as low as) 1-bit Loss -- Card-based Zero-knowledge Proof Protocols for Graph Problems and Their Computational Model -- Post Quantum Cryptography -- Recovery Attack on Bob's Reused Randomness in CRYSTALS-KYBER and SABERA Lattice Reduction Algorithm Based on Sublattice BKZ -- On the (M)iNTRU assumption in the integer case -- Functional Encryption -- Verifiable Functional Encryption using Intel SGX -- Fully Secure Unbounded Zero Inner Product Encryption with Short Ciphertexts and Keys -- Inner-Product Functional Encryption from Random Linear Codes: Trial and Challenges -- Digital Signature -- A CCA-full-anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model -- Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme -- Identification Scheme and Forward-Secure Signature in Identity-Based Setting from Isogenies -- Linearly Homomorphic Signatures with Designated Combiner -- Efficient Attribute-Based Signature for monotone predicates -- Practical Security Protocols -- Spatial Steganalysis Based on Gradient-Based Neural Architecture Search -- Turn-Based Communication Channels -- 
653 |a Cryptography 
653 |a Computer networks  
653 |a Computer Engineering and Networks 
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Computer engineering 
653 |a Data and Information Security 
700 1 |a Yu, Yu  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-030-90402-9 
856 4 0 |u https://doi.org/10.1007/978-3-030-90402-9?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.824 
520 |a This book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in November 2021. The 21 full papers presented were carefully reviewed and selected from 67 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Searchable Encryption, Key Exchange & Zero Knowledge Proof, Post Quantum Cryptography, Functional Encryption, Digital Signature, and Practical Security Protocols