LEADER 03856oam 2200649 450 001 9910483360103321 005 20210604162504.0 010 $a3-540-75670-1 024 7 $a10.1007/978-3-540-75670-5 035 $a(CKB)1000000000490900 035 $a(SSID)ssj0000319650 035 $a(PQKBManifestationID)11277225 035 $a(PQKBTitleCode)TC0000319650 035 $a(PQKBWorkID)10354526 035 $a(PQKB)10461766 035 $a(DE-He213)978-3-540-75670-5 035 $a(MiAaPQ)EBC336870 035 $a(MiAaPQ)EBC4976741 035 $a(MiAaPQ)EBC6426757 035 $a(Au-PeEL)EBL336870 035 $a(OCoLC)191470454 035 $a(PPN)123728657 035 $a(EXLCZ)991000000000490900 100 $a20210604d2007 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aProvable security $efirst international conference, provsec 2007, wollongong, australia, november 1-2, 2007. Proceedings /$fedited by Willy Susilo, Joseph K. Liu, Yi Mu 205 $a1st ed. 2007. 210 1$aBerlin, Germany :$cSpringer,$d[2007] 210 4$d©2007 215 $a1 online resource (X, 246 p.) 225 1 $aSecurity and Cryptology ;$v4784 300 $aIncludes index. 311 $a3-540-75669-8 327 $aAuthentication -- Stronger Security of Authenticated Key Exchange -- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels -- Asymmetric Encryption -- CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts -- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks -- Signature -- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function -- Two Notes on the Security of Certificateless Signatures -- A Provably Secure Ring Signature Scheme in Certificateless Cryptography -- Protocol and Proving Technique -- Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use -- Does Secure Time-Stamping Imply Collision-Free Hash Functions? -- Formal Proof of Provable Security by Game-Playing in a Proof Assistant -- Authentication and Symmetric Encryption (Short Papers) -- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication -- An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security -- On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers -- Signature (Short Papers) -- Practical Threshold Signatures Without Random Oracles -- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature -- Asymmetric Encryption (Short Papers) -- Formal Security Treatments for Signatures from Identity-Based Encryption -- Decryptable Searchable Encryption. 330 $aThis book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia, October 31 - November 2, 2007. The 10 revised full papers presented together with 7 short papers were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption. 410 0$aSecurity and Cryptology ;$v4784 606 $aComputer systems$xAccess control$vCongresses 606 $aCryptography$vCongresses 606 $aComputer security$vCongresses 615 0$aComputer systems$xAccess control 615 0$aCryptography 615 0$aComputer security 676 $a005.8 702 $aMu$b Yi$f1955- 702 $aSusilo$b Willy 702 $aLiu$b Joseph K. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a9910483360103321 996 $aProvable Security$9772128 997 $aUNINA