LEADER 03814oam 2200457 450 001 996418208803316 005 20210505101308.0 010 $a3-030-62576-1 024 7 $a10.1007/978-3-030-62576-4 035 $a(CKB)4100000011586092 035 $a(DE-He213)978-3-030-62576-4 035 $a(MiAaPQ)EBC6403601 035 $a(PPN)252506774 035 $a(EXLCZ)994100000011586092 100 $a20210505d2020 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aProvable and practical security $e14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, proceedings /$fKhoa Nguyen [and three others] editors 205 $a1st ed. 2020. 210 1$aCham, Switzerland :$cSpringer,$d[2020] 210 4$d©2020 215 $a1 online resource (XIII, 423 p. 123 illus., 14 illus. in color.) 225 1 $aSecurity and Cryptology ;$v12505 311 $a3-030-62575-3 327 $aSignature Schemes -- Group Signature without Random Oracles from Randomizable Signatures -- Constant-size Lattice-Based Group Signature with Forward Security in the Standard Model -- A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model -- Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers -- Short Lattice Signatures in the Standard Model with Efficient Tag Generation -- One-Time Delegation of Unlinkable Signing Rights and Its Application -- Watermarkable Signature with Computational Function Preserving -- Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments -- Encryption Schemes and NIZKs -- Semi-Adaptively Secure Offine Witness Encryption from Puncturable Witness PRF.-Improved Indistinguishability for Searchable Symmetric Encryption -- Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions -- A Practical NIZK Argument for Confidential Transactions over Account-model Blockchain -- Secure Machine Learning and Multiparty Computation -- Secure Cumulative Reward Maximization in Linear Stochastic Bandits -- Secure Transfer Learning for Machine Fault Diagnosis under Different Operating Conditions -- Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring -- Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses -- Secret Sharing Schemes -- Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles -- Optimal Threshold Changeable Secret Sharing with New Threshold Change Range -- Security Analyses -- Key Recovery under Plaintext Checking Attack on LAC -- Security of Two NIST Candidates in the Presence of Randomness Reuse. 330 $aThis book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held in Singapore, in November 2020. The 20 full papers presented were carefully reviewed and selected from 59 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: signature schemes, encryption schemes and NIZKS, secure machine learning and multiparty computation, secret sharing schemes, and security analyses. * The conference was held virtually due to the COVID-19 pandemic. 410 0$aSecurity and Cryptology ;$v12505 606 $aComputer security$vCongresses 615 0$aComputer security 676 $a005.8 702 $aNguyẽ̂n$b Khoa 801 0$bCaPaEBR 801 1$bCaPaEBR 801 2$bUtOrBLW 906 $aBOOK 912 $a996418208803316 996 $aProvable and practical security$92113467 997 $aUNISA