


default search action
ProvSec 2016: Nanjing, China
- Liqun Chen, Jinguang Han

:
Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings. Lecture Notes in Computer Science 10005, 2016, ISBN 978-3-319-47421-2
Attribute/Role-Based Cryptography
- Gang Yu, Zhenfu Cao

, Guang Zeng, Wenbao Han:
Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation. 3-18 - Hui Cui

, Robert H. Deng
, Guowei Wu, Junzuo Lai:
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures. 19-38 - Yinhao Jiang, Willy Susilo

, Yi Mu, Fuchun Guo
:
Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update. 39-60 - Bin Liu, Bogdan Warinschi:

Universally Composable Cryptographic Role-Based Access Control. 61-80
Data in Cloud
- Jianhong Zhang, Pengyan Li, Zhibin Sun, Jian Mao:

ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure. 83-100 - Changfeng Li, Huaqun Wang:

Efficient Dynamic Provable Data Possession from Dynamic Binary Tree. 101-111 - Fucai Zhou, Su Peng, Jian Xu

, Zifeng Xu:
Identity-Based Batch Provable Data Possession. 112-129 - Xingxin Li, Youwen Zhu, Jian Wang:

Secure Naïve Bayesian Classification over Encrypted Data in Cloud. 130-150
Searchable Encryption
- Fucai Zhou, Yuxi Li, Alex X. Liu, Muqing Lin, Zifeng Xu:

Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing. 153-172 - Peng Jiang

, Xiaofen Wang, Jianchang Lai, Fuchun Guo
, Rongmao Chen:
Oblivious Keyword Search with Authorization. 173-190 - Rong Ma, Zhenfu Cao

:
Efficient Asymmetric Index Encapsulation Scheme for Named Data. 191-203
Key Management
- Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto:

Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction. 207-226 - Yangguang Tian, Guomin Yang

, Yi Mu, Kaitai Liang
, Yong Yu
:
One-Round Attribute-Based Key Exchange in the Multi-party Setting. 227-243 - Yong Xie, Libing Wu

, Yubo Zhang, Zhiyan Xu:
Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message. 244-254
Encryption
- Kazuya Imamura

, Kazuhiko Minematsu, Tetsu Iwata:
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers. 257-276 - Kamalesh Acharya

, Ratna Dutta:
Secure and Efficient Construction of Broadcast Encryption with Dealership. 277-295 - Yili Ren

, Xiling Luo, Qianhong Wu, Joseph K. Liu, Peng Zhang:
Towards Certificate-Based Group Encryption. 296-305
Leakage Analysis
- Sujuan Li, Yi Mu, Mingwu Zhang, Futai Zhang:

Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage. 309-319 - Jianye Huang, Qiong Huang, Chunhua Pan:

A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model. 320-339 - Yongjun Zhao

, Sherman S. M. Chow
:
Towards Proofs of Ownership Beyond Bounded Leakage. 340-350
Homomorphic Encryption
- Chunguang Ma, Juyan Li

, Weiping Ouyang:
A Homomorphic Proxy Re-encryption from Lattices. 353-372 - Zengpeng Li

, Steven D. Galbraith
, Chunguang Ma:
Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme. 373-383 - Jun Gao, Jiaqi Wang, Ning Lu, Fang Zhu, Wenbo Shi:

A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress). 384-391

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














