Search dblp for Publications

export results for "toc:db/conf/provsec/provsec2017.bht:"

 download as .bib file

@inproceedings{DBLP:conf/provsec/AcharyaD17,
  author       = {Kamalesh Acharya and
                  Ratna Dutta},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Provable Secure Constructions for Broadcast Encryption with Personalized
                  Messages},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {329--348},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_20},
  doi          = {10.1007/978-3-319-68637-0\_20},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/AcharyaD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/BuldasGB17,
  author       = {Ahto Buldas and
                  Matthias Geihs and
                  Johannes Buchmann},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Long-Term Secure Time-Stamping Using Preimage-Aware Hash Functions
                  - (Short Version)},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {251--260},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_15},
  doi          = {10.1007/978-3-319-68637-0\_15},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/BuldasGB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/BultelDGGG017,
  author       = {Xavier Bultel and
                  Manik Lal Das and
                  Hardik Gajera and
                  David G{\'{e}}rault and
                  Matthieu Giraud and
                  Pascal Lafourcade},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Verifiable Private Polynomial Evaluation},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {487--506},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_29},
  doi          = {10.1007/978-3-319-68637-0\_29},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/BultelDGGG017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ChakrabortyAR17,
  author       = {Suvradip Chakraborty and
                  Janaka Alawatugoda and
                  C. Pandu Rangan},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory
                  Leakage Setting},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {167--187},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_10},
  doi          = {10.1007/978-3-319-68637-0\_10},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/ChakrabortyAR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ChenDL17,
  author       = {Yuan Chen and
                  Qingkuan Dong and
                  Qiqi Lai},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Natural sd-RCCA Secure Public-Key Encryptions},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {236--250},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_14},
  doi          = {10.1007/978-3-319-68637-0\_14},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ChenDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ChenZ17,
  author       = {Long Chen and
                  Zhenfeng Zhang},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Bootstrapping Fully Homomorphic Encryption with Ring Plaintexts Within
                  Polynomial Noise},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {285--304},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_18},
  doi          = {10.1007/978-3-319-68637-0\_18},
  timestamp    = {Tue, 28 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ChenZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/CuiAQDY17,
  author       = {Hui Cui and
                  Man Ho Au and
                  Baodong Qin and
                  Robert H. Deng and
                  Xun Yi},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Fuzzy Public-Key Encryption Based on Biometric Data},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {400--409},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_24},
  doi          = {10.1007/978-3-319-68637-0\_24},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/CuiAQDY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/FazioGJS17,
  author       = {Nelly Fazio and
                  Rosario Gennaro and
                  Tahereh Jafarikhah and
                  William E. Skeith III},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Homomorphic Secret Sharing from Paillier Encryption},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {381--399},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_23},
  doi          = {10.1007/978-3-319-68637-0\_23},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/FazioGJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/FukumitsuH17,
  author       = {Masayuki Fukumitsu and
                  Shingo Hasegawa},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Impossibility of the Provable Security of the Schnorr Signature from
                  the One-More {DL} Assumption in the Non-programmable Random Oracle
                  Model},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {201--218},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_12},
  doi          = {10.1007/978-3-319-68637-0\_12},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/FukumitsuH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/HartungK0KH17,
  author       = {Gunnar Hartung and
                  Bj{\"{o}}rn Kaidel and
                  Alexander Koch and
                  Jessica Koch and
                  Dominik Hartmann},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Practical and Robust Secure Logging from Fault-Tolerant Sequential
                  Aggregate Signatures},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {87--106},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_6},
  doi          = {10.1007/978-3-319-68637-0\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/HartungK0KH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/IovinoZ17,
  author       = {Vincenzo Iovino and
                  Karol Zebrowski},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Mergeable Functional Encryption},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {434--451},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_26},
  doi          = {10.1007/978-3-319-68637-0\_26},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/IovinoZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LaiXWWL17,
  author       = {Junzuo Lai and
                  Jie Xiong and
                  Chuansheng Wang and
                  Guangzheng Wu and
                  Yanling Li},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {A Secure Cloud Backup System with Deduplication and Assured Deletion},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {74--83},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_5},
  doi          = {10.1007/978-3-319-68637-0\_5},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LaiXWWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiangWLLX17,
  author       = {Zhi Liang and
                  Qianhong Wu and
                  Weiran Liu and
                  Jianwei Liu and
                  Fu Xiao},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Provably Secure Self-Extractable Encryption},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_1},
  doi          = {10.1007/978-3-319-68637-0\_1},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/LiangWLLX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LingNWZ17,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Juanyang Zhang},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Revocable Predicate Encryption from Lattices},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {305--326},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_19},
  doi          = {10.1007/978-3-319-68637-0\_19},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/LingNWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiuLZWL17,
  author       = {Yang Liu and
                  Xingxin Li and
                  Youwen Zhu and
                  Jian Wang and
                  Zhe Liu},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Secure Multi-label Classification over Encrypted Data in Cloud},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {57--73},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_4},
  doi          = {10.1007/978-3-319-68637-0\_4},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LiuLZWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiuYYZ17,
  author       = {Hanlin Liu and
                  Di Yan and
                  Yu Yu and
                  Shuoyao Zhao},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {On the Hardness of Sparsely Learning Parity with Noise},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {261--267},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_16},
  doi          = {10.1007/978-3-319-68637-0\_16},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LiuYYZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/MengZNLHS17,
  author       = {Ru Meng and
                  Yanwei Zhou and
                  Jianting Ning and
                  Kaitai Liang and
                  Jinguang Han and
                  Willy Susilo},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order
                  Groups},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {39--56},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_3},
  doi          = {10.1007/978-3-319-68637-0\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/MengZNLHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/RezaeibaghaMZW17,
  author       = {Fatemeh Rezaeibagha and
                  Yi Mu and
                  Shiwei Zhang and
                  Xiaofen Wang},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Provably Secure Homomorphic Signcryption},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {349--360},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_21},
  doi          = {10.1007/978-3-319-68637-0\_21},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/RezaeibaghaMZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/SantosoS17,
  author       = {Bagus Santoso and
                  Chunhua Su},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Provable Secure Post-Quantum Signature Scheme Based on Isomorphism
                  of Polynomials in Quantum Random Oracle Model},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {271--284},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_17},
  doi          = {10.1007/978-3-319-68637-0\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/SantosoS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/SelviPR17,
  author       = {S. Sharmila Deva Selvi and
                  Arinjita Paul and
                  Chandrasekaran Pandu Rangan},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {413--433},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_25},
  doi          = {10.1007/978-3-319-68637-0\_25},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/SelviPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WangLW17,
  author       = {Zhen Wang and
                  Xiling Luo and
                  Qianhong Wu},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Verifiably Encrypted Group Signatures},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {107--126},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_7},
  doi          = {10.1007/978-3-319-68637-0\_7},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/WangLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WangWSLS017,
  author       = {Yunling Wang and
                  Jianfeng Wang and
                  Shifeng Sun and
                  Joseph K. Liu and
                  Willy Susilo and
                  Xiaofeng Chen},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Towards Multi-user Searchable Encryption Supporting Boolean Query
                  and Fast Decryption},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {24--38},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_2},
  doi          = {10.1007/978-3-319-68637-0\_2},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/WangWSLS017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WijayaLS017,
  author       = {Dimaz Ankaa Wijaya and
                  Joseph K. Liu and
                  Dony Ariadi Suwarsono and
                  Peng Zhang},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {A New Blockchain-Based Value-Added Tax System},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {471--486},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_28},
  doi          = {10.1007/978-3-319-68637-0\_28},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/WijayaLS017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/XuZLXW17,
  author       = {Zifeng Xu and
                  Fucai Zhou and
                  Yuxi Li and
                  Jian Xu and
                  Qiang Wang},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Private Subgraph Matching Protocol},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {455--470},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_27},
  doi          = {10.1007/978-3-319-68637-0\_27},
  timestamp    = {Wed, 14 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/XuZLXW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/XueLH17,
  author       = {Haiyang Xue and
                  Bao Li and
                  Jingnan He},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {New Framework of Password-Based Authenticated Key Exchange from Only-One
                  Lossy Encryption},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {188--198},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_11},
  doi          = {10.1007/978-3-319-68637-0\_11},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/XueLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZengMYH17,
  author       = {Shengke Zeng and
                  Yi Mu and
                  Guomin Yang and
                  Mingxing He},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Deniable Ring Authentication Based on Projective Hash Functions},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {127--143},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_8},
  doi          = {10.1007/978-3-319-68637-0\_8},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/ZengMYH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Zhang17,
  author       = {Fangguo Zhang},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {219--235},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_13},
  doi          = {10.1007/978-3-319-68637-0\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/Zhang17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhangWHCK17,
  author       = {Ping Zhang and
                  Peng Wang and
                  Honggang Hu and
                  Changsong Cheng and
                  Wenke Kuai},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {{INT-RUP} Security of Checksum-Based Authenticated Encryption},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {147--166},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_9},
  doi          = {10.1007/978-3-319-68637-0\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhangWHCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhuZJ17,
  author       = {Dali Zhu and
                  Renjun Zhang and
                  Dingding Jia},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Public-Key Encryption with Simulation-Based Sender Selective-Opening
                  Security},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {361--380},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_22},
  doi          = {10.1007/978-3-319-68637-0\_22},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhuZJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2017,
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0},
  doi          = {10.1007/978-3-319-68637-0},
  isbn         = {978-3-319-68636-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}