LEADER 03884nam 2200637Ia 450 001 9910484630103321 005 20200520144314.0 010 $a3-642-04642-8 024 7 $a10.1007/978-3-642-04642-1 035 $a(CKB)1000000000804449 035 $a(SSID)ssj0000355595 035 $a(PQKBManifestationID)11269719 035 $a(PQKBTitleCode)TC0000355595 035 $a(PQKBWorkID)10340566 035 $a(PQKB)10280560 035 $a(DE-He213)978-3-642-04642-1 035 $a(MiAaPQ)EBC3064794 035 $a(PPN)139962239 035 $a(EXLCZ)991000000000804449 100 $a20100203d2009 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aProvable security $ethird international conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009 : proceedings /$fJosef Pieprzyk, Fangguo Zhang (eds.) 205 $a1st ed. 2009. 210 $aBerlin ;$aNew York $cSpringer$dc2009 215 $a1 online resource (XII, 275 p.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v5848 225 1 $aLNCS sublibrary. SL 4, Security and cryptology 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-04641-X 320 $aIncludes bibliographical references and index. 327 $aInvited Talks -- A Brief History of Security Models for Confidentiality -- Symbolic Methods for Provable Security -- Encryption -- Efficient Non-interactive Universally Composable String-Commitment Schemes -- Spatial Encryption under Simpler Assumption -- Chosen-Ciphertext Secure RSA-Type Cryptosystems -- Anonymous Conditional Proxy Re-encryption without Random Oracle -- Breaking and Fixing of an Identity Based Multi-Signcryption Scheme -- Digital Signatures -- Identity-Based Verifiably Encrypted Signatures without Random Oracles -- How to Prove Security of a Signature with a Tighter Security Reduction -- Twin Signature Schemes, Revisited -- On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions -- Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? -- Anonymous Signatures Revisited -- Cryptographic Protocols -- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles -- Password Authenticated Key Exchange Based on RSA in the Three-Party Settings -- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols -- Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge -- Server-Controlled Identity-Based Authenticated Key Exchange -- Reductions and Privacy -- Oracle Separation in the Non-uniform Model -- GUC-Secure Set-Intersection Computation -- Self-enforcing Private Inference Control. 330 $aThis book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009. The 19 revised full papers and two invited talks presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on encryption, digital signature, cryptographic protocols and reduction and privacy. 410 0$aLecture notes in computer science ;$v5848. 410 0$aLNCS sublibrary.$nSL 4,$pSecurity and cryptology. 517 3 $aProvSec 2009 606 $aComputer security$vCongresses 606 $aCryptography$vCongresses 615 0$aComputer security 615 0$aCryptography 676 $a005.8 686 $a004$2sdnb 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 701 $aPieprzyk$b Josef$f1949-$0714597 701 $aZhang$b Fangguo$01754857 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484630103321 996 $aProvable security$94191369 997 $aUNINA