Provable security : 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings /: 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings. (2018)
- Record Type:
- Book
- Title:
- Provable security : 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings /: 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings. (2018)
- Main Title:
- Provable security : 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings
- Other Titles:
- ProvSec2018
- Further Information:
- Note: Joonsang Baek, Willy Susilo, Jongkil Kim (eds.).
- Editors:
- Baek, Joonsang
Susilo, Willy
Kim, Jongkil - Other Names:
- ProvSec (Conference), 12th
- Contents:
- On the Leakage of Corrupted Garbled Circuits.- Location-Proof System Based on Secure Multi-Party Computations.- Verifiable Homomorphic Secret Sharing.- Single Private-Key Generator Security Implies Multiple Private-Key Generators Security.- Secure Outsourcing of Cryptographic Circuits Manufacturing.- On the Hardness of Learning Parity with Noise over Rings.- A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme.- Multivariate Encryption Schemes Based on the Constrained MQ Problem.- Token-Based Multi-Input Functional Encryption.- On the CCA2 Security of McEliece in the Standard Model.- Efficient Attribute-Based Encryption with BlackBox Traceability.- A Code-Based Linkable Ring Signature Scheme.- Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DejaQ and Dual-Form Signature.- Digital Signatures from the Middle-Product LWE.- Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation.- A Simpler Construction of Identity-Based Ring Signatures from Lattices.- A Generic Construction of Sequential Aggregate MACs from Any MACs.- Length-Preserving Encryption Based on Single-key Tweakable Block Cipher.- Modeling Privacy in WiFi Fingerprinting Indoor Localization.- Security Notions for Cloud Storage and Deduplication.- Forward Secrecy for SPAKE2.- User-Mediated Authentication Protocols and Unforgeability for Key Collision.- BAdASS: Preserving Privacy in Behavioural Advertising with Applied SecretOn the Leakage of Corrupted Garbled Circuits.- Location-Proof System Based on Secure Multi-Party Computations.- Verifiable Homomorphic Secret Sharing.- Single Private-Key Generator Security Implies Multiple Private-Key Generators Security.- Secure Outsourcing of Cryptographic Circuits Manufacturing.- On the Hardness of Learning Parity with Noise over Rings.- A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme.- Multivariate Encryption Schemes Based on the Constrained MQ Problem.- Token-Based Multi-Input Functional Encryption.- On the CCA2 Security of McEliece in the Standard Model.- Efficient Attribute-Based Encryption with BlackBox Traceability.- A Code-Based Linkable Ring Signature Scheme.- Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DejaQ and Dual-Form Signature.- Digital Signatures from the Middle-Product LWE.- Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation.- A Simpler Construction of Identity-Based Ring Signatures from Lattices.- A Generic Construction of Sequential Aggregate MACs from Any MACs.- Length-Preserving Encryption Based on Single-key Tweakable Block Cipher.- Modeling Privacy in WiFi Fingerprinting Indoor Localization.- Security Notions for Cloud Storage and Deduplication.- Forward Secrecy for SPAKE2.- User-Mediated Authentication Protocols and Unforgeability for Key Collision.- BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing.- Signcryption with Quantum Random Oracles.- Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (xi, 424 pages), illustrations
- Subjects:
- 005.8/2
Computer science
Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Data protection -- Congresses
Computers -- Software Development & Engineering -- General
Computers -- Hardware -- General
Computers -- Information Theory
Computers -- Social Aspects -- Human-Computer Interaction
Software Engineering
Computer networking & communications
Algorithms & data structures
Information technology: general issues
Data encryption (Computer science)
Software engineering
Computer network architectures
Data structures (Computer science)
Computers -- Security -- General
Data encryption
Electronic books - Languages:
- English
- ISBNs:
- 9783030014469
3030014460 - Related ISBNs:
- 9783030014452
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed October 18, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.338486
- Ingest File:
- 01_287.xml