default search action
ProvSec 2017: Xi'an, China
- Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li:
Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10592, Springer 2017, ISBN 978-3-319-68636-3
Secure Cloud Storage and Computing
- Zhi Liang, Qianhong Wu, Weiran Liu, Jianwei Liu, Fu Xiao:
Provably Secure Self-Extractable Encryption. 3-23 - Yunling Wang, Jianfeng Wang, Shifeng Sun, Joseph K. Liu, Willy Susilo, Xiaofeng Chen:
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. 24-38 - Ru Meng, Yanwei Zhou, Jianting Ning, Kaitai Liang, Jinguang Han, Willy Susilo:
An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups. 39-56 - Yang Liu, Xingxin Li, Youwen Zhu, Jian Wang, Zhe Liu:
Secure Multi-label Classification over Encrypted Data in Cloud. 57-73 - Junzuo Lai, Jie Xiong, Chuansheng Wang, Guangzheng Wu, Yanling Li:
A Secure Cloud Backup System with Deduplication and Assured Deletion. 74-83
Digital Signature and Authentication
- Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Dominik Hartmann:
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures. 87-106 - Zhen Wang, Xiling Luo, Qianhong Wu:
Verifiably Encrypted Group Signatures. 107-126 - Shengke Zeng, Yi Mu, Guomin Yang, Mingxing He:
Deniable Ring Authentication Based on Projective Hash Functions. 127-143
Authenticated Encryption and Key Exchange
- Ping Zhang, Peng Wang, Honggang Hu, Changsong Cheng, Wenke Kuai:
INT-RUP Security of Checksum-Based Authenticated Encryption. 147-166 - Suvradip Chakraborty, Janaka Alawatugoda, C. Pandu Rangan:
Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting. 167-187 - Haiyang Xue, Bao Li, Jingnan He:
New Framework of Password-Based Authenticated Key Exchange from Only-One Lossy Encryption. 188-198
Security Models
- Masayuki Fukumitsu, Shingo Hasegawa:
Impossibility of the Provable Security of the Schnorr Signature from the One-More DL Assumption in the Non-programmable Random Oracle Model. 201-218 - Fangguo Zhang:
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem. 219-235 - Yuan Chen, Qingkuan Dong, Qiqi Lai:
Natural sd-RCCA Secure Public-Key Encryptions. 236-250 - Ahto Buldas, Matthias Geihs, Johannes Buchmann:
Long-Term Secure Time-Stamping Using Preimage-Aware Hash Functions - (Short Version). 251-260 - Hanlin Liu, Di Yan, Yu Yu, Shuoyao Zhao:
On the Hardness of Sparsely Learning Parity with Noise. 261-267
Lattice and Post-quantum Cryptography
- Bagus Santoso, Chunhua Su:
Provable Secure Post-Quantum Signature Scheme Based on Isomorphism of Polynomials in Quantum Random Oracle Model. 271-284 - Long Chen, Zhenfeng Zhang:
Bootstrapping Fully Homomorphic Encryption with Ring Plaintexts Within Polynomial Noise. 285-304 - San Ling, Khoa Nguyen, Huaxiong Wang, Juanyang Zhang:
Revocable Predicate Encryption from Lattices. 305-326
Public Key Encryption and Signcryption
- Kamalesh Acharya, Ratna Dutta:
Provable Secure Constructions for Broadcast Encryption with Personalized Messages. 329-348 - Fatemeh Rezaeibagha, Yi Mu, Shiwei Zhang, Xiaofen Wang:
Provably Secure Homomorphic Signcryption. 349-360 - Dali Zhu, Renjun Zhang, Dingding Jia:
Public-Key Encryption with Simulation-Based Sender Selective-Opening Security. 361-380 - Nelly Fazio, Rosario Gennaro, Tahereh Jafarikhah, William E. Skeith III:
Homomorphic Secret Sharing from Paillier Encryption. 381-399 - Hui Cui, Man Ho Au, Baodong Qin, Robert H. Deng, Xun Yi:
Fuzzy Public-Key Encryption Based on Biometric Data. 400-409
Proxy Re-encryption and Functional Encryption
- S. Sharmila Deva Selvi, Arinjita Paul, Chandrasekaran Pandu Rangan:
An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing. 413-433 - Vincenzo Iovino, Karol Zebrowski:
Mergeable Functional Encryption. 434-451
Protocols
- Zifeng Xu, Fucai Zhou, Yuxi Li, Jian Xu, Qiang Wang:
Private Subgraph Matching Protocol. 455-470 - Dimaz Ankaa Wijaya, Joseph K. Liu, Dony Ariadi Suwarsono, Peng Zhang:
A New Blockchain-Based Value-Added Tax System. 471-486 - Xavier Bultel, Manik Lal Das, Hardik Gajera, David Gérault, Matthieu Giraud, Pascal Lafourcade:
Verifiable Private Polynomial Evaluation. 487-506
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.