000 04500nam a22006135i 4500
001 978-3-030-90402-9
003 DE-He213
005 20240730180645.0
007 cr nn 008mamaa
008 211027s2021 sz | s |||| 0|eng d
020 _a9783030904029
_9978-3-030-90402-9
024 7 _a10.1007/978-3-030-90402-9
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aProvable and Practical Security
_h[electronic resource] :
_b15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021, Proceedings /
_cedited by Qiong Huang, Yu Yu.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXIII, 393 p. 70 illus., 30 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v13059
505 0 _aSearchable Encryption -- Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control -- Improved Security Model for Public-key Authenticated Encryption with Keyword Search -- Public Key Encryption with Fuzzy Matching -- Partitioned Searchable Encryption -- Key Exchange & Zero Knowledge Proof -- Key Exposure Resistant Group Key Agreement Protocol -- NIKE from Affine Determinant Programs -- OrBit: OR-Proof Identity-Based Identification with Tight Security for (as low as) 1-bit Loss -- Card-based Zero-knowledge Proof Protocols for Graph Problems and Their Computational Model -- Post Quantum Cryptography -- Recovery Attack on Bob's Reused Randomness in CRYSTALS-KYBER and SABERA Lattice Reduction Algorithm Based on Sublattice BKZ -- On the (M)iNTRU assumption in the integer case -- Functional Encryption -- Verifiable Functional Encryption using Intel SGX -- Fully Secure Unbounded Zero Inner Product Encryption with Short Ciphertexts and Keys -- Inner-Product Functional Encryption from Random Linear Codes: Trial and Challenges -- Digital Signature -- A CCA-full-anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model -- Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme -- Identification Scheme and Forward-Secure Signature in Identity-Based Setting from Isogenies -- Linearly Homomorphic Signatures with Designated Combiner -- Efficient Attribute-Based Signature for monotone predicates -- Practical Security Protocols -- Spatial Steganalysis Based on Gradient-Based Neural Architecture Search -- Turn-Based Communication Channels -- .
520 _aThis book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in November 2021. The 21 full papers presented were carefully reviewed and selected from 67 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Searchable Encryption, Key Exchange & Zero Knowledge Proof, Post Quantum Cryptography, Functional Encryption, Digital Signature, and Practical Security Protocols.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer engineering.
_910164
650 0 _aComputer networks .
_931572
650 0 _aData protection.
_97245
650 1 4 _aCryptology.
_931769
650 2 4 _aComputer Engineering and Networks.
_9121233
650 2 4 _aComputer Engineering and Networks.
_9121233
650 2 4 _aData and Information Security.
_931990
700 1 _aHuang, Qiong.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9121234
700 1 _aYu, Yu.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9121235
710 2 _aSpringerLink (Online service)
_9121236
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030904012
776 0 8 _iPrinted edition:
_z9783030904036
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v13059
_9121237
856 4 0 _uhttps://doi.org/10.1007/978-3-030-90402-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c90434
_d90434