


default search action
ProvSec 2019: Cairns, QLD, Australia
- Ron Steinfeld, Tsz Hon Yuen

:
Provable Security - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings. Lecture Notes in Computer Science 11821, Springer 2019, ISBN 978-3-030-31918-2
Post-quantum Cryptography
- Chao Liu, Zhongxiang Zheng, Keting Jia, Limin Tao:

Identity-Concealed Authenticated Encryption from Ring Learning with Errors. 3-18 - Dung Hoang Duong

, Huy Quoc Le
, Partha Sarathi Roy
, Willy Susilo
:
Lattice-Based IBE with Equality Test in Standard Model. 19-40 - Shintaro Terada, Kazuki Yoneyama:

Password-Based Authenticated Key Exchange from Standard Isogeny Assumptions. 41-56
Signatures
- Kang Li, Man Ho Au, Ivan Wang Hei Ho, Yilei Wang:

An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature. 59-76 - Shoichi Hirose

, Junji Shikata
:
History-Free Sequential Aggregate MAC Revisited. 77-93 - Zhipeng Wang

, Qianhong Wu:
A Practical Lattice-Based Sequential Aggregate Signature. 94-109
Encryption
- Xueqiao Liu, Hongbo Li, Guomin Yang

, Willy Susilo
, Joseph Tonien
, Qiong Huang:
Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search. 113-129 - Hiroaki Yamamoto, Yoshihiro Wachi, Hiroshi Fujiwara:

Space-Efficient and Secure Substring Searchable Symmetric Encryption Using an Improved DAWG. 130-148 - Sha Ma, Qiong Huang, Ximing Li

, Meiyan Xiao:
Plaintext-Verifiably-Checkable Encryption. 149-166 - Dongxue Pan, Bei Liang

, Hongda Li, Peifang Ni:
Hierarchical Functional Signcryption: Notion and Construction. 167-185
Attack
- Ashley Fraser, Elizabeth A. Quaglia

, Ben Smyth:
A Critique of Game-Based Definitions of Receipt-Freeness for Voting. 189-205 - Abderrahmane Nitaj, Willy Susilo

, Joseph Tonien
:
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem. 206-221 - Fangguo Zhang

, Shengli Liu:
Solving ECDLP via List Decoding. 222-244
Protocols
- Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Hua Shen, Yi Mu:

Provably Secure Proactive Secret Sharing Without the Adjacent Assumption. 247-264 - Kyosuke Yamashita

, Mehdi Tibouchi, Masayuki Abe:
A Coin-Free Oracle-Based Augmented Black Box Framework. 265-272
Blockchain
- Zeming Lu, Zoe Lin Jiang

, Yulin Wu
, Xuan Wang
, Yantao Zhong:
A Lattice-Based Anonymous Distributed E-Cash from Bitcoin. 275-287 - Haibo Tian, Peiran Luo

, Yinxue Su:
A Centralized Digital Currency System with Rich Functions. 288-302 - Bin Yu, Shabnam Kasra Kermanshahi

, Amin Sakzad
, Surya Nepal
:
Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks. 303-318
Short Papers
- Zhi Zhou

, Xu Chen
:
On-demand Privacy Preservation for Cost-Efficient Edge Intelligence Model Training. 321-329 - Atsushi Fujioka, Katsuyuki Takashima, Kazuki Yoneyama:

One-Round Authenticated Group Key Exchange from Isogenies. 330-338 - Yi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Dawu Gu, Fei Huan, Yanxue Jia:

TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility. 339-346 - Xiang Li, Hui Tian

, Jianting Ning:
Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud Computing. 347-354 - Laltu Sardar

, Sushmita Ruj
:
FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE Scheme. 355-371 - Chaochen Shi, Jiangshan Yu

:
A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection. 372-380

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














