• Media type: E-Book; Conference Proceedings
  • Title: Provable Security : First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings
  • Contributor: Susilo, Willy [Other]; Liu, Joseph K. [Other]; Mu, Yi [Other]
  • imprint: Berlin, Heidelberg: Springer Berlin Heidelberg, 2007
  • Published in: Lecture notes in computer science ; 4784
    Bücher
  • Extent: Online-Ressource (digital)
  • Language: English
  • DOI: 10.1007/978-3-540-75670-5
  • ISBN: 9783540756705
  • Identifier:
  • RVK notation: SS 4800 : Lecture notes in computer science
  • Keywords: Computersicherheit > Datensicherung > Beweisbarkeit
    Sicherheitsprotokoll > Beweisbarkeit
    Authentifikation
    Kryptosystem
    Elektronische Unterschrift
  • Origination:
  • Footnote:
  • Description: Authentication -- Stronger Security of Authenticated Key Exchange -- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels -- Asymmetric Encryption -- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts -- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks -- Signature -- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function -- Two Notes on the Security of Certificateless Signatures -- A Provably Secure Ring Signature Scheme in Certificateless Cryptography -- Protocol and Proving Technique -- Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use -- Does Secure Time-Stamping Imply Collision-Free Hash Functions? -- Formal Proof of Provable Security by Game-Playing in a Proof Assistant -- Authentication and Symmetric Encryption (Short Papers) -- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication -- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security -- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers -- Signature (Short Papers) -- Practical Threshold Signatures Without Random Oracles -- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature -- Asymmetric Encryption (Short Papers) -- Formal Security Treatments for Signatures from Identity-Based Encryption -- Decryptable Searchable Encryption.