Skip to main content
  • Conference proceedings
  • © 2007

Provable Security

First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4784)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ProvSec: International Conference on Provable Security

Conference proceedings info: ProvSec 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (17 papers)

  1. Front Matter

  2. Authentication

    1. Stronger Security of Authenticated Key Exchange

      • Brian LaMacchia, Kristin Lauter, Anton Mityagin
      Pages 1-16
    2. An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels

      • Christophe Tartary, Huaxiong Wang, Josef Pieprzyk
      Pages 17-34
  3. Asymmetric Encryption

    1. CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts

      • Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols
      Pages 35-50
    2. Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks

      • Palash Sarkar, Sanjit Chatterjee
      Pages 51-67
  4. Signature

    1. A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function

      • Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
      Pages 68-84
    2. Two Notes on the Security of Certificateless Signatures

      • Rafael Castro, Ricardo Dahab
      Pages 85-102
  5. Protocol and Proving Technique

    1. Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use

      • Sébastien Canard, Iwen Coisel, Jacques Traoré
      Pages 122-137
    2. Does Secure Time-Stamping Imply Collision-Free Hash Functions?

      • Ahto Buldas, Aivo Jürgenson
      Pages 138-150
    3. Formal Proof of Provable Security by Game-Playing in a Proof Assistant

      • Reynald Affeldt, Miki Tanaka, Nicolas Marti
      Pages 151-168
  6. Authentication and Symmetric Encryption (Short Papers)

    1. Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication

      • Raphael C. -W. Phan, Kim-Kwang Raymond Choo, Swee-Huay Heng
      Pages 169-177
    2. On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers

      • Ermaliza Razali, Raphael C. -W. Phan, Marc Joye
      Pages 188-197
  7. Signature (Short Papers)

    1. Practical Threshold Signatures Without Random Oracles

      • Jin Li, Tsz Hon Yuen, Kwangjo Kim
      Pages 198-207
    2. Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature

      • Jin Li, Kwangjo Kim, Fangguo Zhang, Xiaofeng Chen
      Pages 208-217
  8. Asymmetric Encryption (Short Papers)

    1. Formal Security Treatments for Signatures from Identity-Based Encryption

      • Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang
      Pages 218-227
    2. Decryptable Searchable Encryption

      • Thomas Fuhr, Pascal Paillier
      Pages 228-236
  9. Back Matter

Other Volumes

  1. Provable Security

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access