Coverart for item
The Resource Provable security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, Sherman S.M. Chow, Joseph K. Liu, Lucas C.K. Hui, Siu Ming Yiu (eds.), (electronic book)

Provable security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, Sherman S.M. Chow, Joseph K. Liu, Lucas C.K. Hui, Siu Ming Yiu (eds.), (electronic book)

Label
Provable security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
Title
Provable security
Title remainder
8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
Statement of responsibility
Sherman S.M. Chow, Joseph K. Liu, Lucas C.K. Hui, Siu Ming Yiu (eds.)
Title variation
ProvSec 2014
Creator
Contributor
Editor
Subject
Genre
Language
eng
Summary
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem
Member of
Cataloging source
GW5XE
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2014
http://bibfra.me/vocab/lite/meetingName
ProvSec (Conference)
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
Chow, Sherman S. M.
Series statement
  • Lecture Notes in Computer Science,
  • LNCS sublibrary. SL 4, Security and cryptology
Series volume
8782
http://library.link/vocab/subjectName
  • Computer security
  • Data encryption (Computer science)
  • Data protection
  • Computer Science
  • Data Encryption
  • Systems and Data Security
  • Computers and Society
  • Management of Computing and Information Systems
Label
Provable security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, Sherman S.M. Chow, Joseph K. Liu, Lucas C.K. Hui, Siu Ming Yiu (eds.), (electronic book)
Instantiates
Publication
Note
  • International conference proceedings
  • Includes author index
Antecedent source
unknown
Color
multicolored
Contents
Invited Paper -- Password-Based Authenticated Key Exchange: An Overview -- Practical and Provably Secure Attribute Based Encryption -- Fundamental -- Adaptive versus Static Security in the UC Model -- Impossibility of Surjective Icart-Like Encodings -- Symmetric Key Encryption -- On the practical security bound of GF-NLFSR structure with SPN round function -- Misuse-Resistant Variants of the OMD Authenticated Encryption Mode -- A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function -- Authentication.-Forward-Secure Sequential Aggregate Message Authentication Revisited: Formalization and a Provably Secure Scheme -- A Provable Secure Batch Authentication Scheme for EPCGen2 Tags -- Signatures -- Generic Transformation to Strongly Existentially Unforgettable Signature Schemes with Leakage Resiliency -- Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures -- Protocol -- Verifiable Computation in Multiparty Protocols with Honest Majority -- Public Key Encryption -- Lossy Trapdoor Relation and Its Application to Lossy Encryption and Adaptive Trapdoor Relation.-Compact Public Key Encryption with Minimum Ideal Property of Hash Functions -- Proxy Re-Encryption -- RCCA-Secure Multi-use Bidirectional Proxy Re-Encryption with Master Secret Security -- Fine-grained Conditional Proxy Re-encryption and Application -- Predicate Encryption -- Constructing Subspace Membership Encryption through Inner Product Encryption -- Efficient (Anonymous) Compact HIBE From Standard Assumptions -- Attribute-based Cryptosystem -- Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts -- Attribute-Based Signcryption : Signer Privacy, Strong Unforgetability and IND-CCA2 Security in Adaptive-Predicates Attack -- Short Papers -- How to Use Pseudorandom Generators in Unconditional Security Settings -- Equivalence between MAC and PRF for Blockcipher based Constructions -- A Short Fail-Stop Signature Scheme from Factoring -- Computational Soundness of Asymmetric Bilinear Pairing-based Protocols -- Timed-Release Computational Secret Sharing Scheme and Its Applications -- Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage -- Complete Robustness in Identity-Based Encryption
Control code
SPR893105174
Dimensions
unknown
Extent
1 online resource (xviii, 351 pages)
File format
unknown
Form of item
online
Isbn
9783319124759
Level of compression
unknown
Other control number
10.1007/978-3-319-12475-9
Other physical details
illustrations.
Quality assurance targets
not applicable
Reformatting quality
unknown
Reproduction note
Electronic resource.
Sound
unknown sound
Specific material designation
remote
Label
Provable security : 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, Sherman S.M. Chow, Joseph K. Liu, Lucas C.K. Hui, Siu Ming Yiu (eds.), (electronic book)
Publication
Note
  • International conference proceedings
  • Includes author index
Antecedent source
unknown
Color
multicolored
Contents
Invited Paper -- Password-Based Authenticated Key Exchange: An Overview -- Practical and Provably Secure Attribute Based Encryption -- Fundamental -- Adaptive versus Static Security in the UC Model -- Impossibility of Surjective Icart-Like Encodings -- Symmetric Key Encryption -- On the practical security bound of GF-NLFSR structure with SPN round function -- Misuse-Resistant Variants of the OMD Authenticated Encryption Mode -- A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function -- Authentication.-Forward-Secure Sequential Aggregate Message Authentication Revisited: Formalization and a Provably Secure Scheme -- A Provable Secure Batch Authentication Scheme for EPCGen2 Tags -- Signatures -- Generic Transformation to Strongly Existentially Unforgettable Signature Schemes with Leakage Resiliency -- Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures -- Protocol -- Verifiable Computation in Multiparty Protocols with Honest Majority -- Public Key Encryption -- Lossy Trapdoor Relation and Its Application to Lossy Encryption and Adaptive Trapdoor Relation.-Compact Public Key Encryption with Minimum Ideal Property of Hash Functions -- Proxy Re-Encryption -- RCCA-Secure Multi-use Bidirectional Proxy Re-Encryption with Master Secret Security -- Fine-grained Conditional Proxy Re-encryption and Application -- Predicate Encryption -- Constructing Subspace Membership Encryption through Inner Product Encryption -- Efficient (Anonymous) Compact HIBE From Standard Assumptions -- Attribute-based Cryptosystem -- Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts -- Attribute-Based Signcryption : Signer Privacy, Strong Unforgetability and IND-CCA2 Security in Adaptive-Predicates Attack -- Short Papers -- How to Use Pseudorandom Generators in Unconditional Security Settings -- Equivalence between MAC and PRF for Blockcipher based Constructions -- A Short Fail-Stop Signature Scheme from Factoring -- Computational Soundness of Asymmetric Bilinear Pairing-based Protocols -- Timed-Release Computational Secret Sharing Scheme and Its Applications -- Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage -- Complete Robustness in Identity-Based Encryption
Control code
SPR893105174
Dimensions
unknown
Extent
1 online resource (xviii, 351 pages)
File format
unknown
Form of item
online
Isbn
9783319124759
Level of compression
unknown
Other control number
10.1007/978-3-319-12475-9
Other physical details
illustrations.
Quality assurance targets
not applicable
Reformatting quality
unknown
Reproduction note
Electronic resource.
Sound
unknown sound
Specific material designation
remote

Library Locations

Processing Feedback ...