LEADER 04743nam 22008655 450 001 9910484630103321 005 20251226203600.0 010 $a3-642-04642-8 024 7 $a10.1007/978-3-642-04642-1 035 $a(CKB)1000000000804449 035 $a(SSID)ssj0000355595 035 $a(PQKBManifestationID)11269719 035 $a(PQKBTitleCode)TC0000355595 035 $a(PQKBWorkID)10340566 035 $a(PQKB)10280560 035 $a(DE-He213)978-3-642-04642-1 035 $a(MiAaPQ)EBC3064794 035 $a(PPN)139962239 035 $a(EXLCZ)991000000000804449 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aProvable Security $eThird International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings /$fedited by Josef Pawel Pieprzyk, Fangguo Zhang 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XII, 275 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5848 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-04641-X 320 $aIncludes bibliographical references and index. 327 $aInvited Talks -- A Brief History of Security Models for Confidentiality -- Symbolic Methods for Provable Security -- Encryption -- Efficient Non-interactive Universally Composable String-Commitment Schemes -- Spatial Encryption under Simpler Assumption -- Chosen-Ciphertext Secure RSA-Type Cryptosystems -- Anonymous Conditional Proxy Re-encryption without Random Oracle -- Breaking and Fixing of an Identity Based Multi-Signcryption Scheme -- Digital Signatures -- Identity-Based Verifiably Encrypted Signatures without Random Oracles -- How to Prove Security of a Signature with a Tighter Security Reduction -- Twin Signature Schemes, Revisited -- On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions -- Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? -- Anonymous Signatures Revisited -- Cryptographic Protocols -- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles -- Password Authenticated Key Exchange Based on RSA in the Three-Party Settings -- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols -- Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge -- Server-Controlled Identity-Based Authenticated Key Exchange -- Reductions and Privacy -- Oracle Separation in the Non-uniform Model -- GUC-Secure Set-Intersection Computation -- Self-enforcing Private Inference Control. 330 $aThis book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009. The 19 revised full papers and two invited talks presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on encryption, digital signature, cryptographic protocols and reduction and privacy. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5848 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData structures (Computer science) 606 $aInformation theory 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aCoding theory 606 $aCryptology 606 $aData Structures and Information Theory 606 $aMathematics of Computing 606 $aDiscrete Mathematics in Computer Science 606 $aSymbolic and Algebraic Manipulation 606 $aCoding and Information Theory 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 0$aCoding theory. 615 14$aCryptology. 615 24$aData Structures and Information Theory. 615 24$aMathematics of Computing. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aSymbolic and Algebraic Manipulation. 615 24$aCoding and Information Theory. 676 $a005.8 686 $a004$2sdnb 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 701 $aPieprzyk$b Josef$f1949-$0714597 701 $aZhang$b Fangguo$01754857 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484630103321 996 $aProvable security$94191369 997 $aUNINA