Provable Security : 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings /

This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015. The 19 full papers and 7 short papers presented together with 3 invited talks were carefully reviewed and selected from 60 submissions. Th...

Full description

Bibliographic Details
Corporate Author: ProvSec (Conference) Kanazawa, Japan)
Other Authors: Au, Man-Ho (Editor), Miyaji, Atsuko, Professor (Editor)
Format: Conference Proceeding Book
Language:English
Published: Cham : Springer, 2015
Series:LNCS sublibrary Security and cryptology.
Lecture notes in computer science ; 9451
Subjects:
LEADER 08620nam a2201081Mi 4500
001 3fec39d1-3105-44e8-8837-6e690383f250
005 20240926000000.0
008 151127s2015 sz a o 101 0 eng d
015 |a GBB8N3243  |2 bnb 
016 7 |a 019148477  |2 Uk 
019 |a 932002638  |a 961859547  |a 963328734  |a 964837315 
020 |a 3319260596  |q (electronic bk.) 
020 |a 9783319260594  |q (electronic bk.) 
020 |z 3319260588 
020 |z 9783319260587 
024 7 |a 10.1007/978-3-319-26059-4  |2 doi 
024 8 |a 10.1007/978-3-319-26 
035 |a (OCoLC)932170184  |z (OCoLC)932002638  |z (OCoLC)961859547   |z (OCoLC)963328734  |z (OCoLC)964837315  |z (OCoLC)1005769381  |z (OCoLC)1011851651   |z (OCoLC)1027489918  |z (OCoLC)1048165730  |z (OCoLC)1058526086  |z (OCoLC)1066624631   |z (OCoLC)1081258484  |z (OCoLC)1086490826  |z (OCoLC)1111014728  |z (OCoLC)1112578994   |z (OCoLC)1136578252 
035 |a (OCoLC)932170184  |z (OCoLC)932002638  |z (OCoLC)961859547  |z (OCoLC)963328734  |z (OCoLC)964837315 
035 |a (Sirsi) a11615493 
035 |a (Sirsi) spocn932170184 
037 |a com.springer.onix.9783319260594  |b Springer Nature 
040 |a NUI  |b eng  |e pn  |c NUI  |d OCLCO  |d ORU  |d OCLCF  |d GW5XE  |d OCLCO  |d OCL  |d OCLCO  |d YDXCP   |d DKDLA  |d OCLCQ  |d IAO  |d IAD  |d IAS  |d KSU  |d JBG  |d ICN  |d SOI  |d VT2  |d OCLCQ  |d ILO  |d OCLCQ  |d IOG   |d U3W  |d OCLCA  |d OCLCQ  |d TFW  |d OCLCQ  |d AU@  |d EBLCP  |d WYU  |d UKMGB  |d OCLCQ  |d DCT  |d ERF  |d OCLCQ   |d LQU  |d OCLCQ  |d UKAHL  |d SNK  |d OCLCO  |d CSt 
040 |a NUI  |b eng  |e pn  |c NUI  |d OCLCO  |d ORU  |d OCLCF  |d GW5XE  |d OCLCO  |d OCL  |d OCLCO  |d YDXCP  |d DKDLA  |d OCLCQ  |d IAO  |d IAD  |d IAS  |d KSU  |d JBG  |d ICN  |d SOI  |d VT2  |d OCLCQ  |d ILO 
049 |a MAIN 
050 4 |a QA76.9.A25 
072 7 |a COM053000  |2 bisacsh 
072 7 |a URY  |2 bicssc 
082 0 4 |a 005.82  |2 23 
111 2 |a ProvSec (Conference)  |n (9th :  |d 2015 :  |c Kanazawa, Japan) 
245 1 0 |a Provable Security :  |b 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings /  |c edited by Man-Ho Au, Atsuko Miyaji 
246 3 |a ProvSec 2015 
264 1 |a Cham :  |b Springer,  |c 2015 
300 |a 1 online resource (xix, 504 pages) :  |b color illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
347 |a text file 
347 |b PDF 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 9451 
500 |a Includes author index 
505 0 |a Intro -- Preface -- Provsec 2015 The 9th International Conference on Provable Security -- Invited Talks -- Advances in Authenticated Encryption -- New Advances in Secure RAM Computation -- On Privacy for RFID -- Contents -- Invited Paper -- On Privacy for RFID -- 1 Introduction -- 2 The V07 Model and the OV12 Extension -- 3 The HPVP11 Model -- 4 Strong Privacy in Distance Bounding -- 5 Conclusion -- References -- Fundamental -- From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Efficiency -- 1.3 Further Related Work 
505 8 |a 2 Preliminaries -- 2.1 The UC-Framework -- 2.2 Signature Schemes -- 2.3 Commitment Schemes -- 2.4 Resettably-Sound Zero-Knowledge Arguments of Knowledge -- 2.5 Sig-Com Schemes -- 3 Ideal Functionalities -- 4 Compiler -- 4.1 Protocol Using Resettably-Sound Zero-Knowledge -- 4.2 Protocol Using UC-Secure Seed-OTs -- 5 Optimizations -- 6 Implications -- References -- Constrained Verifiable Random Functions from Indistinguishability Obfuscation -- 1 Introduction -- 2 Preliminaries -- 2.1 Indistinguishability Obfuscation -- 2.2 Puncturable PRFs -- 2.3 Commitment Schemes 19 
505 8 |a 3 Constrained Verifiable Random Functions -- 4 Generic Construction of Constrained VRFs -- 5 Conclusion -- References -- An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure -- 1 Introduction -- 1.1 Background -- 1.2 Our Contributions -- 2 Preliminaries -- 2.1 Notation -- 2.2 HS Algorithm -- Recovering RSA Secret Keys by Using Binary Trees -- -- 2.3 HMM Algorithm and KSI Algorithm -- 2.4 Reviews for Probability Theory and Information Theory -- 3 Improving the KSI Bound by Chernoff -- Hoeffding Bound -- 3.1 The KSI Algorithm 
505 8 |a 3.2 Improved Bounds for Erasure and Error Case -- 4 Practical Countermeasure Against Secret-Key Extraction Attack -- 4.1 Attack Model -- 4.2 Simple (but Ineffective) Countermeasures -- 4.3 Our Countermeasure -- 4.4 Analyses Against Two Types of Adversaries -- 4.5 Information-Theoretic View of our Countermeasure -- 5 Provable Bound for Asymmetric Errors -- A Hamming Distance Between Two Sequences with Erasures -- B Relation Between the Hoeffding Bound and the Chernoff -- Hoeffding Bound -- C Another Parameter Choices -- C.1 How to Choose Analytically -- C.2 More Extension -- References -- Protocol 
505 8 |a Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer -- 1 Introduction -- 2 Preliminaries -- 3 Revisiting the Functionality and Modeling of Communication Channels -- 3.1 Existing Formalizations -- 3.2 What Service Should a Secure Channel Provide? -- 4 Constructing an Augmented Secure Channel via Authenticated Encryption -- 4.1 Assumed Resources -- 4.2 Protocol -- 4.3 The Construction Notion -- 4.4 Proof of the Construction -- 5 The Goal of the TLS 1.3 Record Layer -- 5.1 Formalizing the Goal of TLS Record Payload Protection -- 5.2 Achieving the Goal 
520 |a This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015. The 19 full papers and 7 short papers presented together with 3 invited talks were carefully reviewed and selected from 60 submissions. The papers are grouped in topical sections on fundamental, protocol, authenticated encryption and key exchange, encryption and identification, privacy and cloud, leakage-resilient cryptography and lattice cryptography, signature and broadcast encryption 
546 |a English 
650 0 |a Application software 
650 0 |a Computer science 
650 0 |a Computer security  |v Congresses 
650 0 |a Computer security 
650 0 |a Computers and civilization 
650 0 |a Data encryption (Computer science)  |v Congresses 
650 0 |a Data encryption (Computer science) 
650 0 |a Data protection  |v Congresses 
650 0 |a Management information systems 
650 7 |a Application software  |2 fast 
650 7 |a Business & Economics  |x Information Management  |2 bisacsh 
650 7 |a Coding theory & cryptology  |2 bicssc 
650 7 |a Computer science  |2 fast 
650 7 |a Computer security  |2 bicssc 
650 7 |a Computer security  |2 fast 
650 7 |a Computers and civilization  |2 fast 
650 7 |a Computers  |x Data Processing  |2 bisacsh 
650 7 |a Computers  |x Security  |x General  |2 bisacsh 
650 7 |a Computers  |x Social Aspects  |x General  |2 bisacsh 
650 7 |a Data encryption (Computer science)  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Ethical & social aspects of IT  |2 bicssc 
650 7 |a Information architecture  |2 bicssc 
650 7 |a Management information systems  |2 fast 
650 7 |a Public administration  |2 bicssc 
650 1 4 |a Computer Science 
650 2 4 |a Computer Appl. in Administrative Data Processing 
650 2 4 |a Computers and Society 
650 2 4 |a Data Encryption 
650 2 4 |a Management of Computing and Information Systems 
650 2 4 |a Systems and Data Security 
655 7 |a Conference papers and proceedings  |2 fast 
700 1 |a Au, Man-Ho,  |e editor  |1 http://viaf.org/viaf/81145003279361300096 
700 1 |a Au, Man-Ho,  |e editor 
700 1 |a Miyaji, Atsuko,  |c Professor,  |e editor  |1 http://viaf.org/viaf/13507281 
700 1 |a Miyaji, Atsuko,  |c Professor,  |e editor 
776 0 8 |i Printed edition:  |z 9783319260587 
830 0 |a LNCS sublibrary  |n SL 4,  |p Security and cryptology. 
830 0 |a Lecture notes in computer science ;  |v 9451  |x 0302-9743 
999 1 0 |i 3fec39d1-3105-44e8-8837-6e690383f250  |l a11615493  |s US-CST  |m provable_security9th_international_conference_provsec_2015_kanazawa_ja_____2015_______sprina________________________________________provsec__conference________________e 
999 1 0 |i 3fec39d1-3105-44e8-8837-6e690383f250  |l 11097021  |s US-ICU  |m provable_security9th_international_conference_provsec_2015_kanazawa_ja_____2015_______sprina________________________________________provsec__conference________________e 
999 1 1 |l a11615493  |s ISIL:US-CST  |t BKS  |b 507e055a-2f95-5e71-840b-8fce1707cec3  |y 507e055a-2f95-5e71-840b-8fce1707cec3  |p UNLOANABLE 
999 1 1 |l a11615493  |s ISIL:US-CST  |t BKS  |a SUL-ELECTRONIC  |p UNLOANABLE