


default search action
ProvSec 2007: Wollongong, Australia
- Willy Susilo
, Joseph K. Liu, Yi Mu:
Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings. Lecture Notes in Computer Science 4784, Springer 2007, ISBN 978-3-540-75669-9
Authentication
- Brian A. LaMacchia, Kristin E. Lauter, Anton Mityagin:
Stronger Security of Authenticated Key Exchange. 1-16 - Christophe Tartary, Huaxiong Wang, Josef Pieprzyk
:
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. 17-34
Asymmetric Encryption
- Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols
:
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. 35-50 - Palash Sarkar, Sanjit Chatterjee:
Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks. 51-67
Signature
- Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. 68-84 - Rafael Castro, Ricardo Dahab:
Two Notes on the Security of Certificateless Signatures. 85-102 - Lei Zhang, Futai Zhang, Wei Wu:
A Provably Secure Ring Signature Scheme in Certificateless Cryptography. 103-121
Protocol and Proving Technique
- Sébastien Canard, Iwen Coisel, Jacques Traoré:
Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use. 122-137 - Ahto Buldas, Aivo Jürgenson:
Does Secure Time-Stamping Imply Collision-Free Hash Functions? 138-150 - Reynald Affeldt
, Miki Tanaka, Nicolas Marti:
Formal Proof of Provable Security by Game-Playing in a Proof Assistant. 151-168
Authentication and Symmetric Encryption (Short Papers)
- Raphael C.-W. Phan, Kim-Kwang Raymond Choo, Swee-Huay Heng:
Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication. 169-177 - Wei Li, Dawu Gu:
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security. 178-187 - Ermaliza Razali, Raphael C.-W. Phan, Marc Joye:
On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers. 188-197
Signature (Short Papers)
- Jin Li, Tsz Hon Yuen, Kwangjo Kim:
Practical Threshold Signatures Without Random Oracles. 198-207 - Jin Li, Kwangjo Kim, Fangguo Zhang
, Xiaofeng Chen:
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature. 208-217
Asymmetric Encryption (Short Papers)
- Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for Signatures from Identity-Based Encryption. 218-227 - Thomas Fuhr, Pascal Paillier:
Decryptable Searchable Encryption. 228-236

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
