Amazon cover image
Image from Amazon.com

Provable and practical security : 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings / Khoa Nguyen, Wenling Wu, Kwok Yan Lam, Huaxiong Wang (eds.).

By: (14th : ProvSec (Conference) (14th : 2020 : Online)Contributor(s): Nguyen, Khoa [editor.] | Wu, Wenling [editor.] | Lam, Kwok Yan [editor.] | Wang, Huaxiong [editor]Material type: TextTextSeries: Serienbezeichnung | LNCS sublibrary. SL 4, Security and cryptology. | Lecture notes in computer science ; 12505.Publisher: Cham : Springer, 2020Description: 1 online resource (xiii, 423 pages) : illustrations (some color)Content type: text Media type: computer Carrier type: online resourceISBN: 9783030625764; 3030625761Other title: ProvSec 2020Subject(s): Computer security -- Congresses | Data encryption (Computer science) -- Congresses | Computer organization | Computers | Data structures (Computer science) | Software engineering | Computer security | Computer organization | Computers | Data encryption (Computer science) | Data structures (Computer science) | Software engineeringGenre/Form: Conference papers and proceedings. | Electronic books. | Electronic books. Additional physical formats: No titleDDC classification: 005.82 LOC classification: QA76.9.A25QA76.9.D335 | P76 2020Online resources: Click here to access online
Contents:
Signature Schemes -- Group Signature without Random Oracles from Randomizable Signatures -- Constant-size Lattice-Based Group Signature with Forward Security in the Standard Model -- A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model -- Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers -- Short Lattice Signatures in the Standard Model with Efficient Tag Generation -- One-Time Delegation of Unlinkable Signing Rights and Its Application -- Watermarkable Signature with Computational Function Preserving -- Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments -- Encryption Schemes and NIZKs -- Semi-Adaptively Secure Offine Witness Encryption from Puncturable Witness PRF.-Improved Indistinguishability for Searchable Symmetric Encryption -- Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions -- A Practical NIZK Argument for Confidential Transactions over Account-model Blockchain -- Secure Machine Learning and Multiparty Computation -- Secure Cumulative Reward Maximization in Linear Stochastic Bandits -- Secure Transfer Learning for Machine Fault Diagnosis under Different Operating Conditions -- Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring -- Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses -- Secret Sharing Schemes -- Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles -- Optimal Threshold Changeable Secret Sharing with New Threshold Change Range -- Security Analyses -- Key Recovery under Plaintext Checking Attack on LAC -- Security of Two NIST Candidates in the Presence of Randomness Reuse.
Summary: This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held in Singapore, in November 2020. The 20 full papers presented were carefully reviewed and selected from 59 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: signature schemes, encryption schemes and NIZKS, secure machine learning and multiparty computation, secret sharing schemes, and security analyses. * The conference was held virtually due to the COVID-19 pandemic.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

"The conference was held virtually due to the COVID-19 pandemic."

This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held in Singapore, in November 2020. The 20 full papers presented were carefully reviewed and selected from 59 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: signature schemes, encryption schemes and NIZKS, secure machine learning and multiparty computation, secret sharing schemes, and security analyses. * The conference was held virtually due to the COVID-19 pandemic.

Signature Schemes -- Group Signature without Random Oracles from Randomizable Signatures -- Constant-size Lattice-Based Group Signature with Forward Security in the Standard Model -- A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model -- Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers -- Short Lattice Signatures in the Standard Model with Efficient Tag Generation -- One-Time Delegation of Unlinkable Signing Rights and Its Application -- Watermarkable Signature with Computational Function Preserving -- Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments -- Encryption Schemes and NIZKs -- Semi-Adaptively Secure Offine Witness Encryption from Puncturable Witness PRF.-Improved Indistinguishability for Searchable Symmetric Encryption -- Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions -- A Practical NIZK Argument for Confidential Transactions over Account-model Blockchain -- Secure Machine Learning and Multiparty Computation -- Secure Cumulative Reward Maximization in Linear Stochastic Bandits -- Secure Transfer Learning for Machine Fault Diagnosis under Different Operating Conditions -- Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring -- Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses -- Secret Sharing Schemes -- Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles -- Optimal Threshold Changeable Secret Sharing with New Threshold Change Range -- Security Analyses -- Key Recovery under Plaintext Checking Attack on LAC -- Security of Two NIST Candidates in the Presence of Randomness Reuse.

Includes author index.

Powered by Koha