default search action
ProvSec 2018: Jeju, South Korea
- Joonsang Baek, Willy Susilo, Jongkil Kim:
Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings. Lecture Notes in Computer Science 11192, Springer 2018, ISBN 978-3-030-01445-2
Foundation
- Aurélien Dupin, David Pointcheval, Christophe Bidan:
On the Leakage of Corrupted Garbled Circuits. 3-21 - Aurélien Dupin, Jean-Marc Robert, Christophe Bidan:
Location-Proof System Based on Secure Multi-party Computations. 22-39 - Georgia Tsaloli, Bei Liang, Aikaterini Mitrokotsa:
Verifiable Homomorphic Secret Sharing. 40-55 - Atsushi Fujioka, Kazuki Yoneyama:
Single Private-Key Generator Security Implies Multiple Private-Key Generators Security. 56-74 - Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi:
Secure Outsourcing of Cryptographic Circuits Manufacturing. 75-93 - Shuoyao Zhao, Yu Yu, Jiang Zhang:
On the Hardness of Learning Parity with Noise over Rings. 94-108
Public Key Encryption
- Arinjita Paul, Varshika Srinivasavaradhan, S. Sharmila Deva Selvi, C. Pandu Rangan:
A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme. 111-128 - Takanori Yasuda:
Multivariate Encryption Schemes Based on the Constrained MQ Problem. 129-146 - Nuttapong Attrapadung, Goichiro Hanaoka, Takato Hirano, Yutaka Kawai, Yoshihiro Koseki, Jacob C. N. Schuldt:
Token-Based Multi-input Functional Encryption. 147-164 - Edoardo Persichetti:
On the CCA2 Security of McEliece in the Standard Model. 165-181 - Shengmin Xu, Guomin Yang, Yi Mu, Ximeng Liu:
Efficient Attribute-Based Encryption with Blackbox Traceability. 182-200
Digital Signature
- Pedro Branco, Paulo Mateus:
A Code-Based Linkable Ring Signature Scheme. 203-219 - Sanjit Chatterjee, R. Kabaleeshwaran:
Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature (Extended Abstract). 220-238 - Ryo Hiromasa:
Digital Signatures from the Middle-Product LWE. 239-257 - David Derler, Sebastian Ramacher, Daniel Slamanig:
Generic Double-Authentication Preventing Signatures and a Post-quantum Instantiation. 258-276 - Gongming Zhao, Miaomiao Tian:
A Simpler Construction of Identity-Based Ring Signatures from Lattices. 277-291
Symmetric Key Cryptography
- Shingo Sato, Shoichi Hirose, Junji Shikata:
Generic Construction of Sequential Aggregate MACs from Any MACs. 295-312 - Xiangyang Zhang, Yaobin Shen, Hailun Yan, Ying Zou, Ming Wan, Zheyi Wu, Lei Wang:
Length-Preserving Encryption Based on Single-Key Tweakable Block Cipher. 313-326
Applications
- Zheng Yang, Kimmo Järvinen:
Modeling Privacy in WiFi Fingerprinting Indoor Localization. 329-346 - Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Security Notions for Cloud Storage and Deduplication. 347-365 - José Becerra, Dimiter Ostrev, Marjan Skrobot:
Forward Secrecy of SPAKE2. 366-384
Short Papers
- Britta Hale:
User-Mediated Authentication Protocols and Unforgeability in Key Collision. 387-396 - Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin:
BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing. 397-405 - Shingo Sato, Junji Shikata:
Signcryption with Quantum Random Oracles. 406-414 - Satoshi Yasuda, Yoshihiro Koseki, Yusuke Sakai, Fuyuki Kitagawa, Yutaka Kawai, Goichiro Hanaoka:
Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols. 415-422
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.