The third International Conference on Provable Security (ProvSec 2009) was held in Guangzhou, China, November 11-13, 2009. It continued the theme of ProvableSecurity initiated by the ProvSec2007 conference in Wollongong, A- tralia. The second ProvSec conference was organized in Shanghai, China. The conference was sponsored by the Center for Advanced Computing Cryptog- phy and Algorithms (ACAC), Macquarie University, Australia; Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, China; andthe NationalNaturalScienceFoundationofChina (NSFC).JiwuHuangwas the General Chair and we, Josef Pieprzyk and Fangguo Zhang, were Program Co-chairs. The conference proceedings have been published by Springer in this volume of Lecture Notes in Computer Science. The Program Committee invited two distinguished researchers to deliver their keynote talks. The ?rst speaker was Alex Dent from Royal Holloway, University of London. His talk was entitled A Brief History of Se
curity Models for Con dentiality . The second speaker was Bogdan Warinschi from the University of Bristol, UK, who presented a talk on Symbolic Methods for Provable Security . We received 64 papers. Each paper was assigned to three referees. Papers submitted by the members of the Program Committee were assigned to ?ve referees. In the ?rst stage of the review process, the submitted papers were readand evaluated bythe PCmembers and then in the secondstage,the papers werescrutinizedduringanextensivediscussion.Finally,theProgramCommittee chose 19 papers to be included in the conference program. The authors of the accepted papers had three weeks for revision and preparation of ?nal versions.
Invited Talks.- A Brief History of Security Models for Confidentiality.- Symbolic Methods for Provable Security.- Encryption.- Efficient Non-interactive Universally Composable String-Commitment Schemes.- Spatial Encryption under Simpler Assumption.- Chosen-Ciphertext Secure RSA-Type Cryptosystems.- Anonymous Conditional Proxy Re-encryption without Random Oracle.- Breaking and Fixing of an Identity Based Multi-Signcryption Scheme.- Digital Signatures.- Identity-Based Verifiably Encrypted Signatures without Random Oracles.- How to Prove Security of a Signature with a Tighter Security Reduction.- Twin Signature Schemes, Revisited.- On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions.- Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures .- Anonymous Signatures Revisited.- Cryptographic Protocols.- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles.- Password Authenticated Key Exchange Based on
RSA in the Three-Party Settings.- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols.- Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge.- Server-Controlled Identity-Based Authenticated Key Exchange.- Reductions and Privacy.- Oracle Separation in the Non-uniform Model.- GUC-Secure Set-Intersection Computation.- Self-enforcing Private Inference Control.