Provable Security: First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia, October 31 - November 2, 2007.

The 10 revised full papers presented together with seven short papers were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption.

Author(s): Brian LaMacchia, Kristin Lauter, Anton Mityagin (auth.), Willy Susilo, Joseph K. Liu, Yi Mu (eds.)
Series: Lecture Notes in Computer Science 4784 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007

Language: English
Pages: 246
Tags: Systems and Data Security; Data Structures, Cryptology and Information Theory; Data Encryption; Electronic Commerce/e-business; Legal Aspects of Computing

Front Matter....Pages -
Stronger Security of Authenticated Key Exchange....Pages 1-16
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels....Pages 17-34
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts....Pages 35-50
Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks....Pages 51-67
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function....Pages 68-84
Two Notes on the Security of Certificateless Signatures....Pages 85-102
A Provably Secure Ring Signature Scheme in Certificateless Cryptography....Pages 103-121
Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use....Pages 122-137
Does Secure Time-Stamping Imply Collision-Free Hash Functions?....Pages 138-150
Formal Proof of Provable Security by Game-Playing in a Proof Assistant....Pages 151-168
Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication....Pages 169-177
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security....Pages 178-187
On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers....Pages 188-197
Practical Threshold Signatures Without Random Oracles....Pages 198-207
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature....Pages 208-217
Formal Security Treatments for Signatures from Identity-Based Encryption....Pages 218-227
Decryptable Searchable Encryption....Pages 228-236
Back Matter....Pages -