03856oam 2200649 450 991048336010332120210604162504.03-540-75670-110.1007/978-3-540-75670-5(CKB)1000000000490900(SSID)ssj0000319650(PQKBManifestationID)11277225(PQKBTitleCode)TC0000319650(PQKBWorkID)10354526(PQKB)10461766(DE-He213)978-3-540-75670-5(MiAaPQ)EBC336870(MiAaPQ)EBC4976741(MiAaPQ)EBC6426757(Au-PeEL)EBL336870(OCoLC)191470454(PPN)123728657(EXLCZ)99100000000049090020210604d2007 uy 0engurnn|008mamaatxtccrProvable security first international conference, provsec 2007, wollongong, australia, november 1-2, 2007. Proceedings /edited by Willy Susilo, Joseph K. Liu, Yi Mu1st ed. 2007.Berlin, Germany :Springer,[2007]©20071 online resource (X, 246 p.) Security and Cryptology ;4784Includes index.3-540-75669-8 Authentication -- Stronger Security of Authenticated Key Exchange -- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels -- Asymmetric Encryption -- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts -- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks -- Signature -- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function -- Two Notes on the Security of Certificateless Signatures -- A Provably Secure Ring Signature Scheme in Certificateless Cryptography -- Protocol and Proving Technique -- Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use -- Does Secure Time-Stamping Imply Collision-Free Hash Functions? -- Formal Proof of Provable Security by Game-Playing in a Proof Assistant -- Authentication and Symmetric Encryption (Short Papers) -- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication -- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security -- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers -- Signature (Short Papers) -- Practical Threshold Signatures Without Random Oracles -- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature -- Asymmetric Encryption (Short Papers) -- Formal Security Treatments for Signatures from Identity-Based Encryption -- Decryptable Searchable Encryption.This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia, October 31 - November 2, 2007. The 10 revised full papers presented together with 7 short papers were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption.Security and Cryptology ;4784Computer systemsAccess controlCongressesCryptographyCongressesComputer securityCongressesComputer systemsAccess controlCryptographyComputer security005.8Mu Yi1955-Susilo WillyLiu Joseph K.MiAaPQMiAaPQUtOrBLWBOOK9910483360103321Provable Security772128UNINA