語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Provable and Practical Security = 14...
~
Wu, Wenling.
Provable and Practical Security = 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Provable and Practical Security/ edited by Khoa Nguyen, Wenling Wu, Kwok Yan Lam, Huaxiong Wang.
其他題名:
14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings /
其他作者:
Wang, Huaxiong.
面頁冊數:
XIII, 423 p. 123 illus., 14 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computing Milieux. -
電子資源:
https://doi.org/10.1007/978-3-030-62576-4
ISBN:
9783030625764
Provable and Practical Security = 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings /
Provable and Practical Security
14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings /[electronic resource] :edited by Khoa Nguyen, Wenling Wu, Kwok Yan Lam, Huaxiong Wang. - 1st ed. 2020. - XIII, 423 p. 123 illus., 14 illus. in color.online resource. - Security and Cryptology ;12505. - Security and Cryptology ;9241.
Signature Schemes -- Group Signature without Random Oracles from Randomizable Signatures -- Constant-size Lattice-Based Group Signature with Forward Security in the Standard Model -- A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model -- Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers -- Short Lattice Signatures in the Standard Model with Efficient Tag Generation -- One-Time Delegation of Unlinkable Signing Rights and Its Application -- Watermarkable Signature with Computational Function Preserving -- Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments -- Encryption Schemes and NIZKs -- Semi-Adaptively Secure Offine Witness Encryption from Puncturable Witness PRF.-Improved Indistinguishability for Searchable Symmetric Encryption -- Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions -- A Practical NIZK Argument for Confidential Transactions over Account-model Blockchain -- Secure Machine Learning and Multiparty Computation -- Secure Cumulative Reward Maximization in Linear Stochastic Bandits -- Secure Transfer Learning for Machine Fault Diagnosis under Different Operating Conditions -- Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring -- Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses -- Secret Sharing Schemes -- Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles -- Optimal Threshold Changeable Secret Sharing with New Threshold Change Range -- Security Analyses -- Key Recovery under Plaintext Checking Attack on LAC -- Security of Two NIST Candidates in the Presence of Randomness Reuse.
This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held in Singapore, in November 2020. The 20 full papers presented were carefully reviewed and selected from 59 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: signature schemes, encryption schemes and NIZKS, secure machine learning and multiparty computation, secret sharing schemes, and security analyses. * The conference was held virtually due to the COVID-19 pandemic.
ISBN: 9783030625764
Standard No.: 10.1007/978-3-030-62576-4doiSubjects--Topical Terms:
669921
Computing Milieux.
LC Class. No.: QA76.9.D335
Dewey Class. No.: 005.82
Provable and Practical Security = 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings /
LDR
:03913nam a22004215i 4500
001
1027144
003
DE-He213
005
20201029094415.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030625764
$9
978-3-030-62576-4
024
7
$a
10.1007/978-3-030-62576-4
$2
doi
035
$a
978-3-030-62576-4
050
4
$a
QA76.9.D335
072
7
$a
GPJ
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.82
$2
23
245
1 0
$a
Provable and Practical Security
$h
[electronic resource] :
$b
14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings /
$c
edited by Khoa Nguyen, Wenling Wu, Kwok Yan Lam, Huaxiong Wang.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XIII, 423 p. 123 illus., 14 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
12505
505
0
$a
Signature Schemes -- Group Signature without Random Oracles from Randomizable Signatures -- Constant-size Lattice-Based Group Signature with Forward Security in the Standard Model -- A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model -- Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers -- Short Lattice Signatures in the Standard Model with Efficient Tag Generation -- One-Time Delegation of Unlinkable Signing Rights and Its Application -- Watermarkable Signature with Computational Function Preserving -- Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments -- Encryption Schemes and NIZKs -- Semi-Adaptively Secure Offine Witness Encryption from Puncturable Witness PRF.-Improved Indistinguishability for Searchable Symmetric Encryption -- Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions -- A Practical NIZK Argument for Confidential Transactions over Account-model Blockchain -- Secure Machine Learning and Multiparty Computation -- Secure Cumulative Reward Maximization in Linear Stochastic Bandits -- Secure Transfer Learning for Machine Fault Diagnosis under Different Operating Conditions -- Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring -- Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses -- Secret Sharing Schemes -- Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles -- Optimal Threshold Changeable Secret Sharing with New Threshold Change Range -- Security Analyses -- Key Recovery under Plaintext Checking Attack on LAC -- Security of Two NIST Candidates in the Presence of Randomness Reuse.
520
$a
This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held in Singapore, in November 2020. The 20 full papers presented were carefully reviewed and selected from 59 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: signature schemes, encryption schemes and NIZKS, secure machine learning and multiparty computation, secret sharing schemes, and security analyses. * The conference was held virtually due to the COVID-19 pandemic.
650
2 4
$a
Computing Milieux.
$3
669921
650
2 4
$a
Software Engineering/Programming and Operating Systems.
$3
669780
650
2 4
$a
Data Structures and Information Theory.
$3
1211601
650
2 4
$a
Information Systems and Communication Service.
$3
669203
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
669309
650
1 4
$a
Cryptology.
$3
1211076
650
0
$a
Software engineering.
$3
562952
650
0
$a
Data structures (Computer science).
$3
680370
650
0
$a
Computers.
$3
565115
650
0
$a
Computer organization.
$3
596298
650
0
$a
Data encryption (Computer science).
$3
1051084
700
1
$a
Wang, Huaxiong.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
894686
700
1
$a
Lam, Kwok Yan.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1323518
700
1
$a
Wu, Wenling.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1323517
700
1
$a
Nguyen, Khoa.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1323516
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030625757
776
0 8
$i
Printed edition:
$z
9783030625771
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-62576-4
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入