Amazon cover image
Image from Amazon.com

Provable security : 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings / Tsuyoshi Takagi [and others] (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 7496. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2012.Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642332722
  • 3642332722
Other title:
  • ProvSec 2012
Subject(s): Genre/Form: Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25 P76 2012
Online resources:
Contents:
Tools over Bilinear Groups for Modular Design of Cryptographic Tasks / Masayuki Abe -- One-Move Convertible Nominative Signature in the Standard Model / Dennis Y.W. Liu and Duncan S. Wong -- Efficient and Random Oracle-Free Conditionally Anonymous Ring Signature / Shengke Zeng, Zhiguang Qin, Qing Lu and Qinyi Li -- ID Based Signcryption Scheme in Standard Model / S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy and C. Pandu Rangan -- Combined Public-Key Schemes: The Case of ABE and ABS / Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang and Dengguo Feng -- Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices / Ioana Boureanu and Serge Vaudenay -- Deterministic Random Oracles / Margus Niitsoo -- On the (Non- )Equivalence of UC Security Notions / Oana Ciobotaru -- LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation / Bo Yang and Mingwu Zhang -- Anonymous Identity-Based Hash Proof System and Its Applications / Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao -- Efficient Escrow-Free Identity-Based Signature / Yunmei Zhang, Joseph K. Liu, Xinyi Huang, Man Ho Au and Willy Susilo.
Perfect Keyword Privacy in PEKS Systems / Mototsugu Nishioka -- Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures / Tapas Pandit and Rana Barua -- Symmetric Inner-Product Predicate Encryption Based on Three Groups / Masayuki Yoshino, Noboru Kunihiro, Ken Naganuma and Hisayoshi Sato -- Secure Keyword Search Using Bloom Filter with Specified Character Positions / Takanori Suga, Takashi Nishide and Kouichi Sakurai -- Fully Secure Doubly-Spatial Encryption under Simple Assumptions / Cheng Chen, Zhenfeng Zhang and Dengguo Feng -- Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles / Zheng Yang and Jörg Schwenk -- Authenticated Key Exchange with Entities from Different Settings and Varied Groups / Yanfei Guo and Zhenfeng Zhang -- On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties / Mohammad Reza Reyhanitabar and Willy Susilo -- Revisiting a Secret Sharing Approach to Network Codes / Zhaohui Tang, Hoon Wei Lim and Huaxiong Wang -- Codes Based Tracing and Revoking Scheme with Constant Ciphertext / Xingwen Zhao and Hui Li.
Summary: This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Tools over Bilinear Groups for Modular Design of Cryptographic Tasks / Masayuki Abe -- One-Move Convertible Nominative Signature in the Standard Model / Dennis Y.W. Liu and Duncan S. Wong -- Efficient and Random Oracle-Free Conditionally Anonymous Ring Signature / Shengke Zeng, Zhiguang Qin, Qing Lu and Qinyi Li -- ID Based Signcryption Scheme in Standard Model / S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy and C. Pandu Rangan -- Combined Public-Key Schemes: The Case of ABE and ABS / Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang and Dengguo Feng -- Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices / Ioana Boureanu and Serge Vaudenay -- Deterministic Random Oracles / Margus Niitsoo -- On the (Non- )Equivalence of UC Security Notions / Oana Ciobotaru -- LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation / Bo Yang and Mingwu Zhang -- Anonymous Identity-Based Hash Proof System and Its Applications / Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao -- Efficient Escrow-Free Identity-Based Signature / Yunmei Zhang, Joseph K. Liu, Xinyi Huang, Man Ho Au and Willy Susilo.

Perfect Keyword Privacy in PEKS Systems / Mototsugu Nishioka -- Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures / Tapas Pandit and Rana Barua -- Symmetric Inner-Product Predicate Encryption Based on Three Groups / Masayuki Yoshino, Noboru Kunihiro, Ken Naganuma and Hisayoshi Sato -- Secure Keyword Search Using Bloom Filter with Specified Character Positions / Takanori Suga, Takashi Nishide and Kouichi Sakurai -- Fully Secure Doubly-Spatial Encryption under Simple Assumptions / Cheng Chen, Zhenfeng Zhang and Dengguo Feng -- Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles / Zheng Yang and Jörg Schwenk -- Authenticated Key Exchange with Entities from Different Settings and Varied Groups / Yanfei Guo and Zhenfeng Zhang -- On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties / Mohammad Reza Reyhanitabar and Willy Susilo -- Revisiting a Secret Sharing Approach to Network Codes / Zhaohui Tang, Hoon Wei Lim and Huaxiong Wang -- Codes Based Tracing and Revoking Scheme with Constant Ciphertext / Xingwen Zhao and Hui Li.

Includes bibliographical references and author index.

This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.

English.

Powered by Koha