001451039 000__ 04263cam\a2200565\i\4500 001451039 001__ 1451039 001451039 003__ OCoLC 001451039 005__ 20230310004640.0 001451039 006__ m\\\\\o\\d\\\\\\\\ 001451039 007__ cr\un\nnnunnun 001451039 008__ 221108s2022\\\\sz\a\\\\o\\\\\101\0\eng\d 001451039 019__ $$a1350439381$$a1350451925 001451039 020__ $$a9783031209178$$q(electronic bk.) 001451039 020__ $$a3031209176$$q(electronic bk.) 001451039 020__ $$z9783031209161$$q(print) 001451039 020__ $$z3031209168 001451039 0247_ $$a10.1007/978-3-031-20917-8$$2doi 001451039 035__ $$aSP(OCoLC)1350488534 001451039 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dEBLCP$$dOCLCF$$dOCLCQ$$dUKAHL 001451039 049__ $$aISEA 001451039 050_4 $$aQA76.9.A25 001451039 08204 $$a005.8/2$$223/eng/20221108 001451039 1112_ $$aProvSec (Conference)$$n(16th :$$d2022 :$$cNanjing Shi, China) 001451039 24510 $$aProvable and practical security :$$b16th International Conference, ProvSec 2022, Nanjing, China, November 11-12, 2022, Proceedings /$$cChunpeng Ge, Fuchun Guo (eds.). 001451039 2463_ $$aProvSec 2022 001451039 264_1 $$aCham, Switzerland :$$bSpringer,$$c2022. 001451039 300__ $$a1 online resource (x, 291 pages) :$$billustrations (some color). 001451039 336__ $$atext$$btxt$$2rdacontent 001451039 337__ $$acomputer$$bc$$2rdamedia 001451039 338__ $$aonline resource$$bcr$$2rdacarrier 001451039 4901_ $$aLecture notes in computer science,$$x1611-3349 ;$$v13600 001451039 500__ $$aIncludes author index. 001451039 5050_ $$aEncryption -- A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test -- Secure-Channel Free Certificateless Searchable Public key Authenticated Encryption with Keyword Search -- More Efficient Verifiable Functional Encryption -- Subverting Deniability -- Epoch Confidentiality in Updatable Encryption -- Lattice Based Cryptography -- Simplified Server-Aided Revocable Identity-Based Encryption from Lattices -- Lattice-based Public Key Cryptosystems invoking Linear Mapping Mask -- Batched Fully Dynamic Multi-key FHE from FHEW-like Cryptosystems -- Zero-knowledge Range Arguments for Signed Fractional Numbers from Lattices -- Information Security -- Fast Out-of-band Data Integrity Monitor to Mitigate Memory Corruption Attacks -- Construction of a New UAV Management System based on UMIA Technology -- FP2-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning -- Practical Federated Learning for Samples with Different IDs -- Blockchain -- Reinforcement-Mining: Protecting Reward in Selfish Mining -- FolketID: A Decentralized Blockchain-based NemID Alternative against DDosS Attacks -- Secure Collaboration between Consortiums in Permissioned Blockchains -- Foundations -- (Public) Verifiability For Composable Protocols Without Adaptivity Or Zero-Knowledge -- Practical Non-Malleable Codes from Symmetric-key Primitives in 2-Split-State Model -- Cryptographic Role-Based Access Control, Reconsidered. 001451039 506__ $$aAccess limited to authorized users. 001451039 520__ $$aThis book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nanjing, China, in November 11-12,2022. The 15 full papers and 4 short papers were presented carefully reviewed and selected from 52 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Encryption; Lattice Based Cryptography; Information Security; Blockchain; and Foundations. 001451039 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed November 8, 2022). 001451039 650_0 $$aComputer security$$vCongresses. 001451039 650_0 $$aData encryption (Computer science)$$vCongresses. 001451039 655_0 $$aElectronic books. 001451039 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001451039 7001_ $$aGe, Chunpeng,$$eeditor. 001451039 7001_ $$aGuo, Fuchun$$c(Computer scientist),$$eeditor.$$1https://orcid.org/0000-0001-6939-7710 001451039 77608 $$iPrint version: $$z3031209168$$z9783031209161$$w(OCoLC)1347218123 001451039 830_0 $$aLecture notes in computer science ;$$v13600.$$x1611-3349 001451039 852__ $$bebk 001451039 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-20917-8$$zOnline Access$$91397441.1 001451039 909CO $$ooai:library.usi.edu:1451039$$pGLOBAL_SET 001451039 980__ $$aBIB 001451039 980__ $$aEBOOK 001451039 982__ $$aEbook 001451039 983__ $$aOnline 001451039 994__ $$a92$$bISE