Stop the war!
Остановите войну!
for scientists:
default search action
ProvSec 2014: Hong Kong, China
- Sherman S. M. Chow, Joseph K. Liu, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings. Lecture Notes in Computer Science 8782, Springer 2014, ISBN 978-3-319-12474-2
Invited Paper
- Michel Abdalla:
Password-Based Authenticated Key Exchange: An Overview. 1-9
Fundamental
- Ivan Damgård, Jesper Buus Nielsen:
Adaptive versus Static Security in the UC Model. 10-28 - Mehdi Tibouchi:
Impossibility of Surjective Icart-Like Encodings. 29-39
Symmetric Key Encryption
- Guangyao Zhao, Lei Cheng, Chao Li, Ruilin Li, Xuan Shen:
On the Practical Security Bound of GF-NLFSR Structure with SPN Round Function. 40-54 - Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:
Misuse-Resistant Variants of the OMD Authenticated Encryption Mode. 55-70 - Shoichi Hirose, Hidenori Kuwakado:
A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function. 71-86
Authentication
- Shoichi Hirose, Hidenori Kuwakado:
Forward-Secure Sequential Aggregate Message Authentication Revisited. 87-102 - Jiageng Chen, Atsuko Miyaji, Chunhua Su:
A Provable Secure Batch Authentication Scheme for EPCGen2 Tags. 103-116
Signatures
- Yuyu Wang, Keisuke Tanaka:
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency. 117-129 - Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu:
Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures. 130-145
Protocol
- Peeter Laud, Alisa Pankova:
Verifiable Computation in Multiparty Protocols with Honest Majority. 146-161
Public Key Encryption
- Haiyang Xue, Xianhui Lu, Bao Li, Yamin Liu:
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation. 162-177 - Kazuki Yoneyama, Goichiro Hanaoka:
Compact Public Key Encryption with Minimum Ideal Property of Hash Functions. 178-193
Proxy Re-Encryption
- Rongxing Lu, Xiaodong Lin, Jun Shao, Kaitai Liang:
RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security. 194-205 - Yanjiang Yang, Haibing Lu, Jian Weng, Youcheng Zhang, Kouichi Sakurai:
Fine-Grained Conditional Proxy Re-Encryption and Application. 206-222
Predicate Encryption
- Shuichi Katsumata, Noboru Kunihiro:
Constructing Subspace Membership Encryption through Inner Product Encryption. 223-242 - Somindu C. Ramanna, Palash Sarkar:
Efficient (Anonymous) Compact HIBE from Standard Assumptions. 243-258
Attribute-Based Cryptosystem
- Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li:
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. 259-273 - Tapas Pandit, Sumit Kumar Pandey, Rana Barua:
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack. 274-290
Short Papers
- Koji Nuida:
How to Use Pseudorandom Generators in Unconditional Security Settings. 291-299 - Nilanjan Datta, Mridul Nandi:
Equivalence between MAC, WCR and PRF for Blockcipher Based Constructions. 300-308 - Takashi Yamakawa, Nobuaki Kitajima, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
A Short Fail-Stop Signature Scheme from Factoring. 309-316 - Kazuki Yoneyama:
Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols. 317-325 - Yohei Watanabe, Junji Shikata:
Timed-Release Computational Secret Sharing Scheme and Its Applications. 326-333 - Lukasz Krzywiecki:
Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage. 334-341 - Hui Cui, Yi Mu, Man Ho Au:
Complete Robustness in Identity-Based Encryption. 342-349
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.