Provable Security
Springer International Publishing (Verlag)
978-3-030-01445-2 (ISBN)
On the Leakage of Corrupted Garbled Circuits.- Location-Proof System Based on Secure Multi-Party Computations.- Verifiable Homomorphic Secret Sharing.- Single Private-Key Generator Security Implies Multiple Private-Key Generators Security.- Secure Outsourcing of Cryptographic Circuits Manufacturing.- On the Hardness of Learning Parity with Noise over Rings.- A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme.- Multivariate Encryption Schemes Based on the Constrained MQ Problem.- Token-Based Multi-Input Functional Encryption.- On the CCA2 Security of McEliece in the Standard Model.- Efficient Attribute-Based Encryption with BlackBox Traceability.- A Code-Based Linkable Ring Signature Scheme.- Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DejaQ and Dual-Form Signature.- Digital Signatures from the Middle-Product LWE.- Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation.- A Simpler Construction of Identity-Based Ring Signatures from Lattices.- A Generic Construction of Sequential Aggregate MACs from Any MACs.- Length-Preserving Encryption Based on Single-key Tweakable Block Cipher.- Modeling Privacy in WiFi Fingerprinting Indoor Localization.- Security Notions for Cloud Storage and Deduplication.- Forward Secrecy for SPAKE2.- User-Mediated Authentication Protocols and Unforgeability for Key Collision.- BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing.- Signcryption with Quantum Random Oracles.- Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols.
Erscheinungsdatum | 09.10.2018 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 424 p. 42 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 664 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | authentication • authentication protocols • block and stream ciphers • Computer Science • cryptography • Data Mining • data privacy • digital signature • Digital Signatures • electronic document identification systems • Encryption • hash functions and authentification codes • Human-Computer Interaction (HCI) • identity based cryptography • information theorectic techniques • Key Management • Network Security • Project Management • Public Key Cryptography • public key encryption • random oracle model • ring signatures • Software engineering |
ISBN-10 | 3-030-01445-2 / 3030014452 |
ISBN-13 | 978-3-030-01445-2 / 9783030014452 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich