Provable and Practical Security : 15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021, Proceedings (Lecture Notes in Computer Science)

個数:

Provable and Practical Security : 15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021, Proceedings (Lecture Notes in Computer Science)

  • オンデマンド(OD/POD)版です。キャンセルは承れません。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 393 p.
  • 商品コード 9783030904012

Full Description

This book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in November 2021.  The 21 full papers presented were carefully reviewed and selected from 67 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Searchable Encryption, Key Exchange & Zero Knowledge Proof, Post Quantum Cryptography, Functional Encryption, Digital Signature, and Practical Security Protocols.

Contents

Searchable Encryption.- Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control.- Improved Security Model for Public-key Authenticated Encryption with Keyword Search.- Public Key Encryption with Fuzzy Matching.- Partitioned Searchable Encryption.- Key Exchange & Zero Knowledge Proof.- Key Exposure Resistant Group Key Agreement Protocol.- NIKE from Affine Determinant Programs.- OrBit: OR-Proof Identity-Based Identification with Tight Security for (as low as) 1-bit Loss.- Card-based Zero-knowledge Proof Protocols for Graph Problems and Their Computational Model.- Post Quantum Cryptography.- Recovery Attack on Bob's Reused Randomness in CRYSTALS-KYBER and SABERA Lattice Reduction Algorithm Based on Sublattice BKZ.- On the (M)iNTRU assumption in the integer case.- Functional Encryption.- Verifiable Functional Encryption using Intel SGX.- Fully Secure Unbounded Zero Inner Product Encryption with Short Ciphertexts and Keys.- Inner-Product Functional Encryption from Random Linear Codes: Trial and Challenges.- Digital Signature.- A CCA-full-anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model.- Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme.- Identification Scheme and Forward-Secure Signature in Identity-Based Setting from Isogenies.- Linearly Homomorphic Signatures with Designated Combiner.- Efficient Attribute-Based Signature for monotone predicates.- Practical Security Protocols.- Spatial Steganalysis Based on Gradient-Based Neural Architecture Search.- Turn-Based Communication Channels.-

 

 

最近チェックした商品