000 | 04500nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-030-90402-9 | ||
003 | DE-He213 | ||
005 | 20240730180645.0 | ||
007 | cr nn 008mamaa | ||
008 | 211027s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030904029 _9978-3-030-90402-9 |
||
024 | 7 |
_a10.1007/978-3-030-90402-9 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aProvable and Practical Security _h[electronic resource] : _b15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021, Proceedings / _cedited by Qiong Huang, Yu Yu. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXIII, 393 p. 70 illus., 30 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v13059 |
|
505 | 0 | _aSearchable Encryption -- Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control -- Improved Security Model for Public-key Authenticated Encryption with Keyword Search -- Public Key Encryption with Fuzzy Matching -- Partitioned Searchable Encryption -- Key Exchange & Zero Knowledge Proof -- Key Exposure Resistant Group Key Agreement Protocol -- NIKE from Affine Determinant Programs -- OrBit: OR-Proof Identity-Based Identification with Tight Security for (as low as) 1-bit Loss -- Card-based Zero-knowledge Proof Protocols for Graph Problems and Their Computational Model -- Post Quantum Cryptography -- Recovery Attack on Bob's Reused Randomness in CRYSTALS-KYBER and SABERA Lattice Reduction Algorithm Based on Sublattice BKZ -- On the (M)iNTRU assumption in the integer case -- Functional Encryption -- Verifiable Functional Encryption using Intel SGX -- Fully Secure Unbounded Zero Inner Product Encryption with Short Ciphertexts and Keys -- Inner-Product Functional Encryption from Random Linear Codes: Trial and Challenges -- Digital Signature -- A CCA-full-anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model -- Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme -- Identification Scheme and Forward-Secure Signature in Identity-Based Setting from Isogenies -- Linearly Homomorphic Signatures with Designated Combiner -- Efficient Attribute-Based Signature for monotone predicates -- Practical Security Protocols -- Spatial Steganalysis Based on Gradient-Based Neural Architecture Search -- Turn-Based Communication Channels -- . | |
520 | _aThis book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in November 2021. The 21 full papers presented were carefully reviewed and selected from 67 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Searchable Encryption, Key Exchange & Zero Knowledge Proof, Post Quantum Cryptography, Functional Encryption, Digital Signature, and Practical Security Protocols. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9121233 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9121233 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aHuang, Qiong. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9121234 |
|
700 | 1 |
_aYu, Yu. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9121235 |
|
710 | 2 |
_aSpringerLink (Online service) _9121236 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030904012 |
776 | 0 | 8 |
_iPrinted edition: _z9783030904036 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v13059 _9121237 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-90402-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c90434 _d90434 |