About these proceedings
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem.
access control athematical foundations of cryptography block and stream ciphers cryptanalysis and other attacks cryptographic primitives cryptographic protocols data encryption digital signatures hash functions information-theoretic techniques management and querying of encrypted data message authentication codes privacy-preserving protocols pseudonymity, anonymity and untraceability public key (asymmetric) techniques public key encryption symmetric cryptography