default search action
ProvSec 2011: Xi'an, China
- Xavier Boyen, Xiaofeng Chen:
Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings. Lecture Notes in Computer Science 6980, Springer 2011, ISBN 978-3-642-24315-8
Invited Talks
- Jens Groth:
Optimal Structure-Preserving Signatures. 1 - Vipul Goyal:
Secure Composition of Cryptographic Protocols. 2
Cryptographic Primitives
- Paolo Palmieri, Olivier Pereira:
Secure Two-Party Computation over a Z-Channel. 3-15 - Ning Ding, Dawu Gu:
Precise Time and Space Simulatable Zero-Knowledge. 16-33 - Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga:
Weak Oblivious Transfer from Strong One-Way Functions. 34-51 - Bingsheng Zhang:
Simulatable Adaptive Oblivious Transfer with Statistical Receiver's Privacy. 52-67
Encryption
- Gilles Barthe, Federico Olmedo, Santiago Zanella Béguelin:
Verifiable Security of Boneh-Franklin Identity-Based Encryption. 68-83 - Cheng Chen, Zhenfeng Zhang, Dengguo Feng:
Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost. 84-101 - Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer:
Fully Distributed Broadcast Encryption. 102-119 - Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi:
Efficient Identity-Based Signcryption in the Standard Model. 120-137 - Yoshikazu Hanatani, Hirofumi Muratani, Tomoko Yonemura:
Toward Compact Public Key Encryption Based on CDH Assumption via Extended Twin DH Assumption. 138-153 - Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi:
Anonymous Encryption with Partial-Order Subset Delegation Functionality. 154-169
Cryptographic Protocols
- Tsz Hon Yuen, Duncan S. Wong, Willy Susilo, Qiong Huang:
Concurrent Signatures with Fully Negotiable Binding Control. 170-187 - Rong Cheng, Bo Zhang, Fangguo Zhang:
Secure Obfuscation of Encrypted Verifiable Encrypted Signatures. 188-203 - Duong Hieu Phan, Viet Cuong Trinh:
Identity-Based Trace and Revoke Schemes. 204-221 - Rafael Tonicelli, Bernardo Machado David, Vinícius de Morais Alves:
Universally Composable Private Proximity Testing. 222-239 - Bingsheng Zhang:
Generic Constant-Round Oblivious Sorting Algorithm for MPC. 240-256 - Shengli Liu, Junzuo Lai, Robert H. Deng:
General Construction of Chameleon All-But-One Trapdoor Functions. 257-265
Security Models and Framework
- Liting Zhang, Wenling Wu, Peng Wang:
PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers. 266-280 - Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta:
Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model. 281-296 - Xianhui Lu, Bao Li, Qixiang Mei, Haixia Xu:
Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing. 297-308 - Hitoshi Namiki, Keisuke Tanaka, Kenji Yasunaga:
Randomness Leakage in the KEM/DEM Framework. 309-323 - Gilbert Baumslag, Nelly Fazio, Antonio Nicolosi, Vladimir Shpilrain, William E. Skeith III:
Generalized Learning Problems and Applications to Non-commutative Cryptography. 324-339 - Kristian Gjøsteen, George Petrides, Asgeir Steine:
A Novel Framework for Protocol Analysis. 340-347
Key Agreement
- Kazuki Yoneyama, Yunlei Zhao:
Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage. 348-365 - Fushan Wei, Chuangui Ma, Zhenfeng Zhang:
Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security. 366-379 - Jiaxin Pan, Libin Wang:
TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption. 380-388 - Hai Huang:
Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security. 389-397
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.