© 2009

Provable Security

Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings

  • Josef Pieprzyk
  • Fangguo Zhang
Conference proceedings ProvSec 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5848)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Encryption

    1. Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka
      Pages 3-18
    2. Muxin Zhou, Zhenfu Cao
      Pages 19-31
    3. Benoît Chevallier-Mames, Marc Joye
      Pages 32-46
    4. Liming Fang, Willy Susilo, Jiandong Wang
      Pages 47-60
    5. S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
      Pages 61-75
  4. Digital Signatures

    1. Fuchun Guo, Yi Mu, Willy Susilo
      Pages 90-103
    2. Sven Schäge
      Pages 104-117
    3. Eiichiro Fujisaki, Ryo Nishimaki, Keisuke Tanaka
      Pages 118-128
    4. Vishal Saraswat, Aaram Yun
      Pages 140-153
  5. Cryptographic Protocols

  6. Reductions and Privacy

    1. Ahto Buldas, Sven Laur, Margus Niitsoo
      Pages 230-244

About these proceedings


This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009.

The 19 revised full papers and two invited talks presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on encryption, digital signature, cryptographic protocols and reduction and privacy.


Symbol anonymity cryptographic protocols cryptography digital signatures hash function hash functions pairing privacy secure block ciphers security security models steganography

Editors and affiliations

  • Josef Pieprzyk
    • 1
  • Fangguo Zhang
    • 2
  1. 1.Department of ComputingMacquarie UniversitySydneyAustralia
  2. 2.School of Information Science and TechnologySun Yat-Sen UniversityGuangzhouP.R.China

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking