LEADER 05149nam 22008055 450 001 996466322603316 005 20200703102108.0 010 $a3-642-04642-8 024 7 $a10.1007/978-3-642-04642-1 035 $a(CKB)1000000000804449 035 $a(SSID)ssj0000355595 035 $a(PQKBManifestationID)11269719 035 $a(PQKBTitleCode)TC0000355595 035 $a(PQKBWorkID)10340566 035 $a(PQKB)10280560 035 $a(DE-He213)978-3-642-04642-1 035 $a(MiAaPQ)EBC3064794 035 $a(PPN)139962239 035 $a(EXLCZ)991000000000804449 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aProvable Security$b[electronic resource] $eThird International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings /$fedited by Josef Pawel Pieprzyk, Fangguo Zhang 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XII, 275 p.) 225 1 $aSecurity and Cryptology ;$v5848 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-04641-X 320 $aIncludes bibliographical references and index. 327 $aInvited Talks -- A Brief History of Security Models for Confidentiality -- Symbolic Methods for Provable Security -- Encryption -- Efficient Non-interactive Universally Composable String-Commitment Schemes -- Spatial Encryption under Simpler Assumption -- Chosen-Ciphertext Secure RSA-Type Cryptosystems -- Anonymous Conditional Proxy Re-encryption without Random Oracle -- Breaking and Fixing of an Identity Based Multi-Signcryption Scheme -- Digital Signatures -- Identity-Based Verifiably Encrypted Signatures without Random Oracles -- How to Prove Security of a Signature with a Tighter Security Reduction -- Twin Signature Schemes, Revisited -- On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions -- Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? -- Anonymous Signatures Revisited -- Cryptographic Protocols -- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles -- Password Authenticated Key Exchange Based on RSA in the Three-Party Settings -- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols -- Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge -- Server-Controlled Identity-Based Authenticated Key Exchange -- Reductions and Privacy -- Oracle Separation in the Non-uniform Model -- GUC-Secure Set-Intersection Computation -- Self-enforcing Private Inference Control. 330 $aThis book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009. The 19 revised full papers and two invited talks presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on encryption, digital signature, cryptographic protocols and reduction and privacy. 410 0$aSecurity and Cryptology ;$v5848 606 $aData encryption (Computer science) 606 $aData structures (Computer science) 606 $aComputer science?Mathematics 606 $aCoding theory 606 $aInformation theory 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aMathematics of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I17001 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aSymbolic and Algebraic Manipulation$3https://scigraph.springernature.com/ontologies/product-market-codes/I17052 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 608 $aKanton (Stadt, 2009)$2swd 608 $aKongress.$2swd 615 0$aData encryption (Computer science). 615 0$aData structures (Computer science). 615 0$aComputer science?Mathematics. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aCryptology. 615 24$aData Structures and Information Theory. 615 24$aMathematics of Computing. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aSymbolic and Algebraic Manipulation. 615 24$aCoding and Information Theory. 676 $a005.8 686 $a004$2sdnb 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aPieprzyk$b Josef Pawel$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhang$b Fangguo$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996466322603316 996 $aProvable Security$9772128 997 $aUNISA