Skip to main content
  • Conference proceedings
  • © 2010

Provable Security

4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6402)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ProvSec: International Conference on Provable Security

Conference proceedings info: ProvSec 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (18 papers)

  1. Front Matter

  2. Identification

    1. Improved Zero-Knowledge Identification with Lattices

      • Pierre-Louis Cayrel, Richard Lindner, Markus Rückert, Rosemberg Silva
      Pages 1-17
  3. Auto Proofs

    1. A Calculus for Game-Based Security Proofs

      • David Nowak, Yu Zhang
      Pages 35-52
    2. Automating Computational Proofs for Public-Key-Based Key Exchange

      • Long Ngo, Colin Boyd, Juan González Nieto
      Pages 53-69
  4. Signature I

    1. A Framework for Constructing Convertible Undeniable Signatures

      • Ryo Kikuchi, Le Trieu Phong, Wakaha Ogata
      Pages 70-86
  5. Hash Function

    1. Collision Resistant Double-Length Hashing

      • Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks
      Pages 102-118
    2. Interpreting Hash Function Security Proofs

      • Juraj Šarinay
      Pages 119-132
  6. Protocol

    1. Distinguishing Distributions Using Chernoff Information

      • Thomas Baignères, Pouyan Sepehrdad, Serge Vaudenay
      Pages 144-165
  7. Signature II

    1. A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)

      • Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong
      Pages 166-183
  8. Invited Talk

    1. Cryptographic Protocols from Lattices

      • Eike Kiltz
      Pages 199-199
  9. Encryption

    1. Efficient Broadcast Encryption with Personalized Messages

      • Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa
      Pages 214-228
  10. Signcryption

    1. Identity Based Public Verifiable Signcryption Scheme

      • S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
      Pages 244-260
    2. Fully Secure Threshold Unsigncryption

      • Javier Herranz, Alexandre Ruiz, Germán Sáez
      Pages 261-278
  11. Back Matter

Other Volumes

  1. Provable Security

About this book

This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.


The 17 papers presented were carefully reviewed and selected from 47 submissions. The papers are divided in topical sections on identification, auto proofs, signature, hash function, protocol, encryption, and signcryption.

Editors and Affiliations

  • Faculty of Information Science and Technology, Jalan Ayer Keroh Lama, Multimedia University, Malacca, Malaysia

    Swee-Huay Heng

  • Department of Computer and Information Sciences, Ibaraki University, Hitachi, Japan

    Kaoru Kurosawa

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access