Provable Security

Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings

  • Josef Pieprzyk
  • Fangguo Zhang
Conference proceedings ProvSec 2009

DOI: 10.1007/978-3-642-04642-1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5848)

Table of contents (21 papers)

  1. Front Matter
  2. Invited Talks

  3. Encryption

    1. Efficient Non-interactive Universally Composable String-Commitment Schemes
      Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka
      Pages 3-18
    2. Spatial Encryption under Simpler Assumption
      Muxin Zhou, Zhenfu Cao
      Pages 19-31
    3. Chosen-Ciphertext Secure RSA-Type Cryptosystems
      Benoît Chevallier-Mames, Marc Joye
      Pages 32-46
    4. Anonymous Conditional Proxy Re-encryption without Random Oracle
      Liming Fang, Willy Susilo, Jiandong Wang
      Pages 47-60
    5. Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
      S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
      Pages 61-75
  4. Digital Signatures

    1. How to Prove Security of a Signature with a Tighter Security Reduction
      Fuchun Guo, Yi Mu, Willy Susilo
      Pages 90-103
    2. Twin Signature Schemes, Revisited
      Sven Schäge
      Pages 104-117
    3. On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions
      Eiichiro Fujisaki, Ryo Nishimaki, Keisuke Tanaka
      Pages 118-128
    4. Anonymous Signatures Revisited
      Vishal Saraswat, Aaram Yun
      Pages 140-153
  5. Cryptographic Protocols

  6. Reductions and Privacy

    1. Oracle Separation in the Non-uniform Model
      Ahto Buldas, Sven Laur, Margus Niitsoo
      Pages 230-244

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009.

The 19 revised full papers and two invited talks presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on encryption, digital signature, cryptographic protocols and reduction and privacy.

Keywords

Symbol anonymity cryptographic protocols cryptography digital signatures hash function hash functions pairing privacy secure block ciphers security security models steganography

Editors and affiliations

  • Josef Pieprzyk
    • 1
  • Fangguo Zhang
    • 2
  1. 1.Department of ComputingMacquarie UniversitySydneyAustralia
  2. 2.School of Information Science and TechnologySun Yat-Sen UniversityGuangzhouP.R.China

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-04641-4
  • Online ISBN 978-3-642-04642-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349