Provable Security: Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009.

The 19 revised full papers and two invited talks presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on encryption, digital signature, cryptographic protocols and reduction and privacy.

Author(s): Alexander W. Dent (auth.), Josef Pieprzyk, Fangguo Zhang (eds.)
Series: Lecture Notes in Computer Science 5848 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009

Language: English
Pages: 275
Tags: Data Encryption; Data Structures, Cryptology and Information Theory; Discrete Mathematics in Computer Science; Symbolic and Algebraic Manipulation; Coding and Information Theory; Systems and Data Security

Front Matter....Pages -
A Brief History of Security Models for Confidentiality....Pages 1-1
Symbolic Methods for Provable Security....Pages 2-2
Efficient Non-interactive Universally Composable String-Commitment Schemes....Pages 3-18
Spatial Encryption under Simpler Assumption....Pages 19-31
Chosen-Ciphertext Secure RSA-Type Cryptosystems....Pages 32-46
Anonymous Conditional Proxy Re-encryption without Random Oracle....Pages 47-60
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme....Pages 61-75
Identity-Based Verifiably Encrypted Signatures without Random Oracles....Pages 76-89
How to Prove Security of a Signature with a Tighter Security Reduction....Pages 90-103
Twin Signature Schemes, Revisited....Pages 104-117
On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions....Pages 118-128
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?....Pages 129-139
Anonymous Signatures Revisited....Pages 140-153
An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles....Pages 154-167
Password Authenticated Key Exchange Based on RSA in the Three-Party Settings....Pages 168-182
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols....Pages 183-197
Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge....Pages 198-213
Server-Controlled Identity-Based Authenticated Key Exchange....Pages 214-229
Oracle Separation in the Non-uniform Model....Pages 230-244
GUC-Secure Set-Intersection Computation....Pages 245-259
Self-enforcing Private Inference Control....Pages 260-274
Back Matter....Pages -