Skip to main content
  • Conference proceedings
  • © 2009

Provable Security

Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5848)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ProvSec: International Conference on Provable Security

Conference proceedings info: ProvSec 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (21 papers)

  1. Front Matter

  2. Invited Talks

    1. Symbolic Methods for Provable Security

      • Bogdan Warinschi
      Pages 2-2
  3. Encryption

    1. Efficient Non-interactive Universally Composable String-Commitment Schemes

      • Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka
      Pages 3-18
    2. Spatial Encryption under Simpler Assumption

      • Muxin Zhou, Zhenfu Cao
      Pages 19-31
    3. Chosen-Ciphertext Secure RSA-Type Cryptosystems

      • Benoît Chevallier-Mames, Marc Joye
      Pages 32-46
    4. Anonymous Conditional Proxy Re-encryption without Random Oracle

      • Liming Fang, Willy Susilo, Jiandong Wang
      Pages 47-60
    5. Breaking and Fixing of an Identity Based Multi-Signcryption Scheme

      • S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
      Pages 61-75
  4. Digital Signatures

    1. How to Prove Security of a Signature with a Tighter Security Reduction

      • Fuchun Guo, Yi Mu, Willy Susilo
      Pages 90-103
    2. Twin Signature Schemes, Revisited

      • Sven Schäge
      Pages 104-117
    3. On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions

      • Eiichiro Fujisaki, Ryo Nishimaki, Keisuke Tanaka
      Pages 118-128
    4. Anonymous Signatures Revisited

      • Vishal Saraswat, Aaram Yun
      Pages 140-153
  5. Cryptographic Protocols

    1. An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles

      • Daisuke Moriyama, Tatsuaki Okamoto
      Pages 154-167
    2. Password Authenticated Key Exchange Based on RSA in the Three-Party Settings

      • E. Dongna, Qingfeng Cheng, Chuangui Ma
      Pages 168-182
    3. Server-Controlled Identity-Based Authenticated Key Exchange

      • Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li
      Pages 214-229
  6. Reductions and Privacy

    1. Oracle Separation in the Non-uniform Model

      • Ahto Buldas, Sven Laur, Margus Niitsoo
      Pages 230-244

Other Volumes

  1. Provable Security

About this book

This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009. The 19 revised full papers and two invited talks presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on encryption, digital signature, cryptographic protocols and reduction and privacy.

Editors and Affiliations

  • Department of Computing, Macquarie University, Sydney, Australia

    Josef Pieprzyk

  • School of Information Science and Technology, Sun Yat-Sen University, Guangzhou, P.R.China

    Fangguo Zhang

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access