


default search action
ProvSec 2014: Hong Kong, China
- Sherman S. M. Chow

, Joseph K. Liu, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings. Lecture Notes in Computer Science 8782, Springer 2014, ISBN 978-3-319-12474-2
Invited Paper
- Michel Abdalla

:
Password-Based Authenticated Key Exchange: An Overview. 1-9
Fundamental
- Ivan Damgård, Jesper Buus Nielsen

:
Adaptive versus Static Security in the UC Model. 10-28 - Mehdi Tibouchi

:
Impossibility of Surjective Icart-Like Encodings. 29-39
Symmetric Key Encryption
- Guangyao Zhao, Lei Cheng, Chao Li, Ruilin Li, Xuan Shen:

On the Practical Security Bound of GF-NLFSR Structure with SPN Round Function. 40-54 - Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:

Misuse-Resistant Variants of the OMD Authenticated Encryption Mode. 55-70 - Shoichi Hirose, Hidenori Kuwakado:

A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function. 71-86
Authentication
- Shoichi Hirose, Hidenori Kuwakado:

Forward-Secure Sequential Aggregate Message Authentication Revisited. 87-102 - Jiageng Chen

, Atsuko Miyaji
, Chunhua Su:
A Provable Secure Batch Authentication Scheme for EPCGen2 Tags. 103-116
Signatures
- Yuyu Wang, Keisuke Tanaka:

Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency. 117-129 - Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu:

Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures. 130-145
Protocol
- Peeter Laud, Alisa Pankova:

Verifiable Computation in Multiparty Protocols with Honest Majority. 146-161
Public Key Encryption
- Haiyang Xue

, Xianhui Lu, Bao Li, Yamin Liu:
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation. 162-177 - Kazuki Yoneyama, Goichiro Hanaoka:

Compact Public Key Encryption with Minimum Ideal Property of Hash Functions. 178-193
Proxy Re-Encryption
- Rongxing Lu, Xiaodong Lin, Jun Shao, Kaitai Liang:

RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security. 194-205 - Yanjiang Yang, Haibing Lu, Jian Weng

, Youcheng Zhang, Kouichi Sakurai:
Fine-Grained Conditional Proxy Re-Encryption and Application. 206-222
Predicate Encryption
- Shuichi Katsumata, Noboru Kunihiro:

Constructing Subspace Membership Encryption through Inner Product Encryption. 223-242 - Somindu C. Ramanna, Palash Sarkar:

Efficient (Anonymous) Compact HIBE from Standard Assumptions. 243-258
Attribute-Based Cryptosystem
- Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li:

Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. 259-273 - Tapas Pandit, Sumit Kumar Pandey

, Rana Barua:
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack. 274-290
Short Papers
- Koji Nuida

:
How to Use Pseudorandom Generators in Unconditional Security Settings. 291-299 - Nilanjan Datta, Mridul Nandi:

Equivalence between MAC, WCR and PRF for Blockcipher Based Constructions. 300-308 - Takashi Yamakawa, Nobuaki Kitajima, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:

A Short Fail-Stop Signature Scheme from Factoring. 309-316 - Kazuki Yoneyama:

Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols. 317-325 - Yohei Watanabe, Junji Shikata:

Timed-Release Computational Secret Sharing Scheme and Its Applications. 326-333 - Lukasz Krzywiecki

:
Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage. 334-341 - Hui Cui

, Yi Mu, Man Ho Au:
Complete Robustness in Identity-Based Encryption. 342-349

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














