default search action
ProvSec 2009: Guangzhou, China
- Josef Pieprzyk, Fangguo Zhang:
Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings. Lecture Notes in Computer Science 5848, Springer 2009, ISBN 978-3-642-04641-4
Invited Talks
- Alexander W. Dent:
A Brief History of Security Models for Confidentiality. 1 - Bogdan Warinschi:
Symbolic Methods for Provable Security. 2
Encryption
- Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka:
Efficient Non-interactive Universally Composable String-Commitment Schemes. 3-18 - Muxin Zhou, Zhenfu Cao:
Spatial Encryption under Simpler Assumption. 19-31 - Benoît Chevallier-Mames, Marc Joye:
Chosen-Ciphertext Secure RSA-Type Cryptosystems. 32-46 - Liming Fang, Willy Susilo, Jiandong Wang:
Anonymous Conditional Proxy Re-encryption without Random Oracle. 47-60 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. 61-75
Digital Signatures
- Lei Zhang, Qianhong Wu, Bo Qin:
Identity-Based Verifiably Encrypted Signatures without Random Oracles. 76-89 - Fuchun Guo, Yi Mu, Willy Susilo:
How to Prove Security of a Signature with a Tighter Security Reduction. 90-103 - Sven Schäge:
Twin Signature Schemes, Revisited. 104-117 - Eiichiro Fujisaki, Ryo Nishimaki, Keisuke Tanaka:
On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions. 118-128 - Man Ho Au, Willy Susilo, Yi Mu:
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? 129-139 - Vishal Saraswat, Aaram Yun:
Anonymous Signatures Revisited. 140-153
Cryptographic Protocols
- Daisuke Moriyama, Tatsuaki Okamoto:
An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles. 154-167 - E. Dongna, Qingfeng Cheng, Chuangui Ma:
Password Authenticated Key Exchange Based on RSA in the Three-Party Settings. 168-182 - Berkant Ustaoglu:
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols. 183-197 - Keita Xagawa, Keisuke Tanaka:
Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge. 198-213 - Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li:
Server-Controlled Identity-Based Authenticated Key Exchange. 214-229
Reductions and Privacy
- Ahto Buldas, Sven Laur, Margus Niitsoo:
Oracle Separation in the Non-uniform Model. 230-244 - Yuan Tian, Hao Zhang:
GUC-Secure Set-Intersection Computation. 245-259 - Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zhou, Feng Bao:
Self-enforcing Private Inference Control. 260-274
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.