Provable security : 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings / Tsuyoshi Takagi [and others] (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 7496. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2012.Description: 1 online resourceContent type: - text
- computer
- online resource
- 9783642332722
- 3642332722
- ProvSec 2012
- Computer security -- Congresses
- Data encryption (Computer science) -- Congresses
- Data protection -- Congresses
- Sécurité informatique -- Congrès
- Chiffrement (Informatique) -- Congrès
- Protection de l'information (Informatique) -- Congrès
- Informatique
- Computer security
- Data encryption (Computer science)
- Data protection
- Computer science
- Operating systems (Computers)
- Data protection
- Data encryption (Computer science)
- Information systems
- Systems and Data Security
- Management of Computing and Information Systems
- 005.8 23
- QA76.9.A25 P76 2012
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Tools over Bilinear Groups for Modular Design of Cryptographic Tasks / Masayuki Abe -- One-Move Convertible Nominative Signature in the Standard Model / Dennis Y.W. Liu and Duncan S. Wong -- Efficient and Random Oracle-Free Conditionally Anonymous Ring Signature / Shengke Zeng, Zhiguang Qin, Qing Lu and Qinyi Li -- ID Based Signcryption Scheme in Standard Model / S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy and C. Pandu Rangan -- Combined Public-Key Schemes: The Case of ABE and ABS / Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang and Dengguo Feng -- Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices / Ioana Boureanu and Serge Vaudenay -- Deterministic Random Oracles / Margus Niitsoo -- On the (Non- )Equivalence of UC Security Notions / Oana Ciobotaru -- LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation / Bo Yang and Mingwu Zhang -- Anonymous Identity-Based Hash Proof System and Its Applications / Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao -- Efficient Escrow-Free Identity-Based Signature / Yunmei Zhang, Joseph K. Liu, Xinyi Huang, Man Ho Au and Willy Susilo.
Perfect Keyword Privacy in PEKS Systems / Mototsugu Nishioka -- Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures / Tapas Pandit and Rana Barua -- Symmetric Inner-Product Predicate Encryption Based on Three Groups / Masayuki Yoshino, Noboru Kunihiro, Ken Naganuma and Hisayoshi Sato -- Secure Keyword Search Using Bloom Filter with Specified Character Positions / Takanori Suga, Takashi Nishide and Kouichi Sakurai -- Fully Secure Doubly-Spatial Encryption under Simple Assumptions / Cheng Chen, Zhenfeng Zhang and Dengguo Feng -- Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles / Zheng Yang and Jörg Schwenk -- Authenticated Key Exchange with Entities from Different Settings and Varied Groups / Yanfei Guo and Zhenfeng Zhang -- On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties / Mohammad Reza Reyhanitabar and Willy Susilo -- Revisiting a Secret Sharing Approach to Network Codes / Zhaohui Tang, Hoon Wei Lim and Huaxiong Wang -- Codes Based Tracing and Revoking Scheme with Constant Ciphertext / Xingwen Zhao and Hui Li.
Includes bibliographical references and author index.
This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.
English.