Book Volume 8209 2013

Provable Security

7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings

Editors:

ISBN: 978-3-642-41226-4 (Print) 978-3-642-41227-1 (Online)

Table of contents (19 chapters)

  1. Front Matter

    Pages -

  2. Invited Talk

    1. No Access

      Chapter

      Pages 1-20

      On Modeling Terrorist Frauds

  3. Key Exchange Protocols

    1. No Access

      Chapter

      Pages 21-37

      Authenticated Key Exchange Protocols Based on Factoring Assumption

    2. No Access

      Chapter

      Pages 38-58

      Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round

    3. No Access

      Chapter

      Pages 59-85

      CIL Security Proof for a Password-Based Key Exchange

  4. Security Models

    1. No Access

      Chapter

      Pages 86-103

      Non Observability in the Random Oracle Model

    2. No Access

      Chapter

      Pages 104-120

      Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture

    3. No Access

      Chapter

      Pages 121-138

      Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges

    4. No Access

      Chapter

      Pages 139-153

      Towards Anonymous Ciphertext Indistinguishability with Identity Leakage

  5. Signature and Signcryption Schemes

    1. No Access

      Chapter

      Pages 154-164

      k-time Proxy Signature: Formal Definition and Efficient Construction

    2. No Access

      Chapter

      Pages 165-183

      Anonymous Signcryption against Linear Related-Key Attacks

  6. Authenticated Encryption

    1. No Access

      Chapter

      Pages 184-201

      Improved Authenticity Bound of EAX, and Refinements

    2. No Access

      Chapter

      Pages 202-220

      The Security of the OCB Mode of Operation without the SPRP Assumption

    3. No Access

      Chapter

      Pages 221-238

      A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes

  7. Theory

    1. No Access

      Chapter

      Pages 239-248

      How to Remove the Exponent GCD in HK09

    2. No Access

      Chapter

      Pages 249-270

      Translation-Randomizable Distributions via Random Walks

  8. Public Key Encryption

    1. No Access

      Chapter

      Pages 271-287

      RKA Secure PKE Based on the DDH and HR Assumptions

    2. No Access

      Chapter

      Pages 288-308

      Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext

    3. No Access

      Chapter

      Pages 309-329

      Factoring-Based Proxy Re-Encryption Schemes

    4. No Access

      Chapter

      Pages 330-346

      Towards a Secure Certificateless Proxy Re-Encryption Scheme

  9. Back Matter

    Pages -