LEADER 05169nam 22008295 450 001 996465825203316 005 20200704214408.0 010 $a1-280-38969-9 010 $a9786613567611 010 $a3-642-16280-0 024 7 $a10.1007/978-3-642-16280-0 035 $a(CKB)2550000000019877 035 $a(SSID)ssj0000446724 035 $a(PQKBManifestationID)11312216 035 $a(PQKBTitleCode)TC0000446724 035 $a(PQKBWorkID)10496850 035 $a(PQKB)11629078 035 $a(DE-He213)978-3-642-16280-0 035 $a(MiAaPQ)EBC3065986 035 $a(PPN)149029691 035 $a(EXLCZ)992550000000019877 100 $a20101009d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aProvable Security$b[electronic resource] $e4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings /$fedited by Kaoru Kurosawa 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (X, 279 p. 26 illus.) 225 1 $aSecurity and Cryptology ;$v6402 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-16279-7 320 $aIncludes bibliographical references and index. 327 $aIdentification -- Improved Zero-Knowledge Identification with Lattices -- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks -- Auto Proofs -- A Calculus for Game-Based Security Proofs -- Automating Computational Proofs for Public-Key-Based Key Exchange -- Signature I -- A Framework for Constructing Convertible Undeniable Signatures -- Efficient Confirmer Signatures from the ?Signature of a Commitment? Paradigm -- Hash Function -- Collision Resistant Double-Length Hashing -- Interpreting Hash Function Security Proofs -- Protocol -- Formal and Precise Analysis of Soundness of Several Shuffling Schemes -- Distinguishing Distributions Using Chernoff Information -- Signature II -- A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract) -- An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company?s Reputation -- Invited Talk -- Cryptographic Protocols from Lattices -- Encryption -- A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication -- Efficient Broadcast Encryption with Personalized Messages -- Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption -- Signcryption -- Identity Based Public Verifiable Signcryption Scheme -- Fully Secure Threshold Unsigncryption. 330 $aThis book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010. The 17 papers presented were carefully reviewed and selected from 47 submissions. The papers are divided in topical sections on identification, auto proofs, signature, hash function, protocol, encryption, and signcryption. 410 0$aSecurity and Cryptology ;$v6402 606 $aData encryption (Computer science) 606 $aUser interfaces (Computer systems) 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputer security 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aUser Interfaces and Human Computer Interaction$3https://scigraph.springernature.com/ontologies/product-market-codes/I18067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 608 $aConference proceedings.$2fast 615 0$aData encryption (Computer science). 615 0$aUser interfaces (Computer systems). 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputer security. 615 14$aCryptology. 615 24$aUser Interfaces and Human Computer Interaction. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSystems and Data Security. 676 $a005.8/2 702 $aKurosawa$b Kaoru$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aProvSec (Conference) 906 $aBOOK 912 $a996465825203316 996 $aProvable Security$9772128 997 $aUNISA