default search action
ProvSec 2012: Chengdu, China
- Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu:
Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings. Lecture Notes in Computer Science 7496, Springer 2012, ISBN 978-3-642-33271-5
Invited Talk
- Masayuki Abe:
Tools over Bilinear Groups for Modular Design of Cryptographic Tasks. 1
Signature Schemes
- Dennis Y. W. Liu, Duncan S. Wong:
One-Move Convertible Nominative Signature in the Standard Model. 2-20 - Shengke Zeng, Zhiguang Qin, Qing Lu, Qinyi Li:
Efficient and Random Oracle-Free Conditionally Anonymous Ring Signature. 21-34 - S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan:
ID Based Signcryption Scheme in Standard Model. 35-52 - Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng:
Combined Public-Key Schemes: The Case of ABE and ABS. 53-69
Foundations
- Ioana Boureanu, Serge Vaudenay:
Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices. 70-87 - Margus Niitsoo:
Deterministic Random Oracles. 88-103 - Oana Ciobotaru:
On the (Non-)Equivalence of UC Security Notions. 104-124
Leakage Resilience and Key Escrow
- Bo Yang, Mingwu Zhang:
LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation. 125-142 - Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
Anonymous Identity-Based Hash Proof System and Its Applications. 143-160 - Yunmei Zhang, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo:
Efficient Escrow-Free Identity-Based Signature. 161-174
Encryption Schemes
- Mototsugu Nishioka:
Perfect Keyword Privacy in PEKS Systems. 175-192 - Tapas Pandit, Rana Barua:
Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures. 193-214 - Masayuki Yoshino, Noboru Kunihiro, Ken Naganuma, Hisayoshi Sato:
Symmetric Inner-Product Predicate Encryption Based on Three Groups. 215-234 - Takanori Suga, Takashi Nishide, Kouichi Sakurai:
Secure Keyword Search Using Bloom Filter with Specified Character Positions. 235-252
Short Papers
- Cheng Chen, Zhenfeng Zhang, Dengguo Feng:
Fully Secure Doubly-Spatial Encryption under Simple Assumptions. 253-263 - Zheng Yang, Jörg Schwenk:
Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles. 264-275 - Yanfei Guo, Zhenfeng Zhang:
Authenticated Key Exchange with Entities from Different Settings and Varied Groups. 276-287 - Reza Reyhanitabar, Willy Susilo:
On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties. 288-299
Information Theoretical Security
- ZhaoHui Tang, Hoon Wei Lim, Huaxiong Wang:
Revisiting a Secret Sharing Approach to Network Codes. 300-317 - Xingwen Zhao, Hui Li:
Codes Based Tracing and Revoking Scheme with Constant Ciphertext. 318-335
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.