


default search action
ProvSec 2012: Chengdu, China
- Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu:

Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings. Lecture Notes in Computer Science 7496, Springer 2012, ISBN 978-3-642-33271-5
Invited Talk
- Masayuki Abe:

Tools over Bilinear Groups for Modular Design of Cryptographic Tasks. 1
Signature Schemes
- Dennis Y. W. Liu

, Duncan S. Wong:
One-Move Convertible Nominative Signature in the Standard Model. 2-20 - Shengke Zeng, Zhiguang Qin, Qing Lu, Qinyi Li:

Efficient and Random Oracle-Free Conditionally Anonymous Ring Signature. 21-34 - S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan:

ID Based Signcryption Scheme in Standard Model. 35-52 - Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng:

Combined Public-Key Schemes: The Case of ABE and ABS. 53-69
Foundations
- Ioana Boureanu, Serge Vaudenay:

Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices. 70-87 - Margus Niitsoo:

Deterministic Random Oracles. 88-103 - Oana Ciobotaru:

On the (Non-)Equivalence of UC Security Notions. 104-124
Leakage Resilience and Key Escrow
- Bo Yang, Mingwu Zhang:

LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation. 125-142 - Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao

:
Anonymous Identity-Based Hash Proof System and Its Applications. 143-160 - Yunmei Zhang, Joseph K. Liu

, Xinyi Huang, Man Ho Au
, Willy Susilo
:
Efficient Escrow-Free Identity-Based Signature. 161-174
Encryption Schemes
- Mototsugu Nishioka:

Perfect Keyword Privacy in PEKS Systems. 175-192 - Tapas Pandit

, Rana Barua:
Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures. 193-214 - Masayuki Yoshino, Noboru Kunihiro

, Ken Naganuma, Hisayoshi Sato:
Symmetric Inner-Product Predicate Encryption Based on Three Groups. 215-234 - Takanori Suga, Takashi Nishide, Kouichi Sakurai:

Secure Keyword Search Using Bloom Filter with Specified Character Positions. 235-252
Short Papers
- Cheng Chen, Zhenfeng Zhang, Dengguo Feng:

Fully Secure Doubly-Spatial Encryption under Simple Assumptions. 253-263 - Zheng Yang, Jörg Schwenk:

Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles. 264-275 - Yanfei Guo, Zhenfeng Zhang:

Authenticated Key Exchange with Entities from Different Settings and Varied Groups. 276-287 - Reza Reyhanitabar, Willy Susilo

:
On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties. 288-299
Information Theoretical Security
- ZhaoHui Tang, Hoon Wei Lim, Huaxiong Wang:

Revisiting a Secret Sharing Approach to Network Codes. 300-317 - Xingwen Zhao, Hui Li:

Codes Based Tracing and Revoking Scheme with Constant Ciphertext. 318-335

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














