


default search action
ProvSec 2018: Jeju, South Korea
- Joonsang Baek, Willy Susilo, Jongkil Kim:

Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings. Lecture Notes in Computer Science 11192, Springer 2018, ISBN 978-3-030-01445-2
Foundation
- Aurélien Dupin, David Pointcheval, Christophe Bidan:

On the Leakage of Corrupted Garbled Circuits. 3-21 - Aurélien Dupin, Jean-Marc Robert, Christophe Bidan:

Location-Proof System Based on Secure Multi-party Computations. 22-39 - Georgia Tsaloli, Bei Liang

, Aikaterini Mitrokotsa
:
Verifiable Homomorphic Secret Sharing. 40-55 - Atsushi Fujioka, Kazuki Yoneyama:

Single Private-Key Generator Security Implies Multiple Private-Key Generators Security. 56-74 - Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri

, Yiannis Tselekounis, Daniele Venturi:
Secure Outsourcing of Cryptographic Circuits Manufacturing. 75-93 - Shuoyao Zhao, Yu Yu, Jiang Zhang:

On the Hardness of Learning Parity with Noise over Rings. 94-108
Public Key Encryption
- Arinjita Paul, Varshika Srinivasavaradhan, S. Sharmila Deva Selvi, C. Pandu Rangan:

A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme. 111-128 - Takanori Yasuda:

Multivariate Encryption Schemes Based on the Constrained MQ Problem. 129-146 - Nuttapong Attrapadung, Goichiro Hanaoka, Takato Hirano, Yutaka Kawai, Yoshihiro Koseki, Jacob C. N. Schuldt:

Token-Based Multi-input Functional Encryption. 147-164 - Edoardo Persichetti

:
On the CCA2 Security of McEliece in the Standard Model. 165-181 - Shengmin Xu, Guomin Yang

, Yi Mu, Ximeng Liu:
Efficient Attribute-Based Encryption with Blackbox Traceability. 182-200
Digital Signature
- Pedro Branco, Paulo Mateus

:
A Code-Based Linkable Ring Signature Scheme. 203-219 - Sanjit Chatterjee, R. Kabaleeshwaran

:
Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature (Extended Abstract). 220-238 - Ryo Hiromasa:

Digital Signatures from the Middle-Product LWE. 239-257 - David Derler

, Sebastian Ramacher
, Daniel Slamanig
:
Generic Double-Authentication Preventing Signatures and a Post-quantum Instantiation. 258-276 - Gongming Zhao, Miaomiao Tian:

A Simpler Construction of Identity-Based Ring Signatures from Lattices. 277-291
Symmetric Key Cryptography
- Shingo Sato

, Shoichi Hirose, Junji Shikata:
Generic Construction of Sequential Aggregate MACs from Any MACs. 295-312 - Xiangyang Zhang, Yaobin Shen, Hailun Yan, Ying Zou, Ming Wan, Zheyi Wu, Lei Wang:

Length-Preserving Encryption Based on Single-Key Tweakable Block Cipher. 313-326
Applications
- Zheng Yang

, Kimmo Järvinen
:
Modeling Privacy in WiFi Fingerprinting Indoor Localization. 329-346 - Colin Boyd, Gareth T. Davies

, Kristian Gjøsteen, Håvard Raddum
, Mohsen Toorani
:
Security Notions for Cloud Storage and Deduplication. 347-365 - José Becerra, Dimiter Ostrev, Marjan Skrobot

:
Forward Secrecy of SPAKE2. 366-384
Short Papers
- Britta Hale

:
User-Mediated Authentication Protocols and Unforgeability in Key Collision. 387-396 - Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin

:
BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing. 397-405 - Shingo Sato

, Junji Shikata:
Signcryption with Quantum Random Oracles. 406-414 - Satoshi Yasuda, Yoshihiro Koseki, Yusuke Sakai, Fuyuki Kitagawa, Yutaka Kawai, Goichiro Hanaoka:

Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols. 415-422

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














