Provable Security : 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings / edited by Man-Ho Au, Atsuko Miyaji.
This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015. The 19 full papers and 7 short papers presented together with 3 invited talks were carefully reviewed and selected from 60 submissions. Th...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | , |
Other title: | ProvSec 2015. |
Format: | Conference Proceeding eBook |
Language: | English |
Published: |
Cham :
Springer,
2015.
|
Series: | Lecture notes in computer science ;
9451. LNCS sublibrary. Security and cryptology. |
Subjects: |
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | b8524016 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 151127s2015 sz a o 101 0 eng d | ||
005 | 20240418151326.2 | ||
019 | |a 932002638 |a 961859547 |a 963328734 |a 964837315 |a 1005769381 |a 1011851651 |a 1027489918 |a 1048165730 |a 1058526086 |a 1066624631 |a 1081258484 |a 1086490826 |a 1111014728 |a 1112578994 |a 1136578252 | ||
020 | |a 9783319260594 |q (electronic bk.) | ||
020 | |a 3319260596 |q (electronic bk.) | ||
020 | |z 9783319260587 | ||
020 | |z 3319260588 | ||
024 | 7 | |a 10.1007/978-3-319-26059-4 | |
024 | 8 | |a 10.1007/978-3-319-26 | |
035 | |a (OCoLC)spr932170184 | ||
035 | |a (OCoLC)932170184 |z (OCoLC)932002638 |z (OCoLC)961859547 |z (OCoLC)963328734 |z (OCoLC)964837315 |z (OCoLC)1005769381 |z (OCoLC)1011851651 |z (OCoLC)1027489918 |z (OCoLC)1048165730 |z (OCoLC)1058526086 |z (OCoLC)1066624631 |z (OCoLC)1081258484 |z (OCoLC)1086490826 |z (OCoLC)1111014728 |z (OCoLC)1112578994 |z (OCoLC)1136578252 | ||
037 | |a spr978-3-319-26059-4 | ||
040 | |a NUI |b eng |e pn |c NUI |d OCLCO |d ORU |d OCLCF |d GW5XE |d OCLCO |d OCL |d OCLCO |d YDXCP |d DKDLA |d OCLCQ |d IAO |d IAD |d IAS |d KSU |d JBG |d ICN |d SOI |d VT2 |d OCLCQ |d ILO |d OCLCQ |d IOG |d U3W |d OCLCA |d OCLCQ |d TFW |d OCLCQ |d AU@ |d EBLCP |d WYU |d UKMGB |d OCLCQ |d DCT |d ERF |d OCLCQ |d LQU |d OCLCQ | ||
049 | |a GWRE | ||
050 | 4 | |a QA76.9.A25 | |
111 | 2 | |a ProvSec (Conference) |n (9th : |d 2015 : |c Kanazawa, Japan) | |
245 | 1 | 0 | |a Provable Security : |b 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings / |c edited by Man-Ho Au, Atsuko Miyaji. |
246 | 3 | |a ProvSec 2015. | |
264 | 1 | |a Cham : |b Springer, |c 2015. | |
300 | |a 1 online resource (xix, 504 pages) : |b color illustrations. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
347 | |a text file. | ||
347 | |b PDF. | ||
490 | 1 | |a Lecture Notes in Computer Science, |x 0302-9743 ; |v 9451. | |
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology. | |
500 | |a Includes author index. | ||
505 | 0 | |a Intro -- Preface -- Provsec 2015 The 9th International Conference on Provable Security -- Invited Talks -- Advances in Authenticated Encryption -- New Advances in Secure RAM Computation -- On Privacy for RFID -- Contents -- Invited Paper -- On Privacy for RFID -- 1 Introduction -- 2 The V07 Model and the OV12 Extension -- 3 The HPVP11 Model -- 4 Strong Privacy in Distance Bounding -- 5 Conclusion -- References -- Fundamental -- From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Efficiency -- 1.3 Further Related Work. | |
505 | 8 | |a 2 Preliminaries -- 2.1 The UC-Framework -- 2.2 Signature Schemes -- 2.3 Commitment Schemes -- 2.4 Resettably-Sound Zero-Knowledge Arguments of Knowledge -- 2.5 Sig-Com Schemes -- 3 Ideal Functionalities -- 4 Compiler -- 4.1 Protocol Using Resettably-Sound Zero-Knowledge -- 4.2 Protocol Using UC-Secure Seed-OTs -- 5 Optimizations -- 6 Implications -- References -- Constrained Verifiable Random Functions from Indistinguishability Obfuscation -- 1 Introduction -- 2 Preliminaries -- 2.1 Indistinguishability Obfuscation -- 2.2 Puncturable PRFs -- 2.3 Commitment Schemes 19. | |
505 | 8 | |a 3 Constrained Verifiable Random Functions -- 4 Generic Construction of Constrained VRFs -- 5 Conclusion -- References -- An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure -- 1 Introduction -- 1.1 Background -- 1.2 Our Contributions -- 2 Preliminaries -- 2.1 Notation -- 2.2 HS Algorithm -- Recovering RSA Secret Keys by Using Binary Trees -- -- 2.3 HMM Algorithm and KSI Algorithm -- 2.4 Reviews for Probability Theory and Information Theory -- 3 Improving the KSI Bound by Chernoff -- Hoeffding Bound -- 3.1 The KSI Algorithm. | |
505 | 8 | |a 3.2 Improved Bounds for Erasure and Error Case -- 4 Practical Countermeasure Against Secret-Key Extraction Attack -- 4.1 Attack Model -- 4.2 Simple (but Ineffective) Countermeasures -- 4.3 Our Countermeasure -- 4.4 Analyses Against Two Types of Adversaries -- 4.5 Information-Theoretic View of our Countermeasure -- 5 Provable Bound for Asymmetric Errors -- A Hamming Distance Between Two Sequences with Erasures -- B Relation Between the Hoeffding Bound and the Chernoff -- Hoeffding Bound -- C Another Parameter Choices -- C.1 How to Choose Analytically -- C.2 More Extension -- References -- Protocol. | |
505 | 8 | |a Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer -- 1 Introduction -- 2 Preliminaries -- 3 Revisiting the Functionality and Modeling of Communication Channels -- 3.1 Existing Formalizations -- 3.2 What Service Should a Secure Channel Provide? -- 4 Constructing an Augmented Secure Channel via Authenticated Encryption -- 4.1 Assumed Resources -- 4.2 Protocol -- 4.3 The Construction Notion -- 4.4 Proof of the Construction -- 5 The Goal of the TLS 1.3 Record Layer -- 5.1 Formalizing the Goal of TLS Record Payload Protection -- 5.2 Achieving the Goal. | |
520 | |a This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015. The 19 full papers and 7 short papers presented together with 3 invited talks were carefully reviewed and selected from 60 submissions. The papers are grouped in topical sections on fundamental, protocol, authenticated encryption and key exchange, encryption and identification, privacy and cloud, leakage-resilient cryptography and lattice cryptography, signature and broadcast encryption. | ||
546 | |a English. | ||
650 | 0 | |a Computer security |v Congresses. | |
650 | 0 | |a Data encryption (Computer science) |v Congresses. | |
650 | 0 | |a Data protection |v Congresses. | |
650 | 0 | |a Computer science. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Application software. | |
650 | 0 | |a Computers and civilization. | |
650 | 0 | |a Management information systems. | |
650 | 7 | |a Application software. |2 fast |0 (OCoLC)fst00811706. | |
650 | 7 | |a Computer science. |2 fast |0 (OCoLC)fst00872451. | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484. | |
650 | 7 | |a Computers and civilization. |2 fast |0 (OCoLC)fst00872888. | |
650 | 7 | |a Data encryption (Computer science) |2 fast |0 (OCoLC)fst00887935. | |
650 | 7 | |a Data protection. |2 fast |0 (OCoLC)fst00887958. | |
650 | 7 | |a Management information systems. |2 fast |0 (OCoLC)fst01007271. | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 (OCoLC)fst01423772. | |
700 | 1 | |a Au, Man-Ho, |e editor. | |
700 | 1 | |a Miyaji, Atsuko, |c Professor, |e editor. | |
776 | 0 | 8 | |i Printed edition: |z 9783319260587. |
830 | 0 | |a Lecture notes in computer science ; |v 9451. | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. | |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-319-26059-4 |z Full Text (via Springer) |
907 | |a .b85240163 |b 11-22-21 |c 02-20-16 | ||
998 | |a web |b - - |c f |d b |e - |f eng |g sz |h 0 |i 1 | ||
915 | |a M | ||
956 | |b Springer Nature - Springer Computer Science eBooks 2015 English International | ||
956 | |a Springer e-books | ||
956 | |b Springer Nature - Springer Computer Science eBooks 2015 English International | ||
956 | |a Springer Computer Science eBooks 2015 English/International | ||
999 | f | f | |i c97a6400-3118-5608-84cd-dadd83a01d58 |s 5ff7a34a-54e1-55e0-bea0-c80801871264 |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e QA76.9.A25 |h Library of Congress classification |i Ebooks, Prospector |n 1 |