Provable Security

8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings

  • Sherman S. M. Chow
  • Joseph K. Liu
  • Lucas C. K. Hui
  • Siu Ming Yiu
Conference proceedings ProvSec 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8782)

Table of contents

  1. Front Matter
  2. Invited Paper

  3. Fundamental

    1. Ivan Damgård, Jesper Buus Nielsen
      Pages 10-28
  4. Symmetric Key Encryption

    1. Guangyao Zhao, Lei Cheng, Chao Li, Ruilin Li, Xuan Shen
      Pages 40-54
    2. Reza Reyhanitabar, Serge Vaudenay, Damian Vizár
      Pages 55-70
  5. Authentication

    1. Shoichi Hirose, Hidenori Kuwakado
      Pages 87-102
    2. Jiageng Chen, Atsuko Miyaji, Chunhua Su
      Pages 103-116
  6. Signatures

  7. Protocol

  8. Public Key Encryption

  9. Proxy Re-Encryption

    1. Rongxing Lu, Xiaodong Lin, Jun Shao, Kaitai Liang
      Pages 194-205
    2. Yanjiang Yang, Haibing Lu, Jian Weng, Youcheng Zhang, Kouichi Sakurai
      Pages 206-222
  10. Predicate Encryption

    1. Shuichi Katsumata, Noboru Kunihiro
      Pages 223-242
    2. Somindu C. Ramanna, Palash Sarkar
      Pages 243-258
  11. Attribute-Based Cryptosystem

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem.

Keywords

access control athematical foundations of cryptography block and stream ciphers cryptanalysis and other attacks cryptographic primitives cryptographic protocols data encryption digital signatures hash functions information-theoretic techniques management and querying of encrypted data message authentication codes privacy-preserving protocols pseudonymity, anonymity and untraceability public key (asymmetric) techniques public key encryption symmetric cryptography

Editors and affiliations

  • Sherman S. M. Chow
    • 1
  • Joseph K. Liu
    • 2
  • Lucas C. K. Hui
    • 3
  • Siu Ming Yiu
    • 4
  1. 1.Department of Information EngineeringChinese University of Hong KongSha Tin, N.T.Hong Kong
  2. 2.Institute for Infocomm ResearchA*STARSingaporeSingapore
  3. 3.Department of Computer ScienceThe University of Hong KongHong Kong
  4. 4.Department of Computer ScienceThe University of Hong KongHong Kong

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-12475-9
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-12474-2
  • Online ISBN 978-3-319-12475-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book