default search action
ProvSec 2019: Cairns, QLD, Australia
- Ron Steinfeld, Tsz Hon Yuen:
Provable Security - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings. Lecture Notes in Computer Science 11821, Springer 2019, ISBN 978-3-030-31918-2
Post-quantum Cryptography
- Chao Liu, Zhongxiang Zheng, Keting Jia, Limin Tao:
Identity-Concealed Authenticated Encryption from Ring Learning with Errors. 3-18 - Dung Hoang Duong, Huy Quoc Le, Partha Sarathi Roy, Willy Susilo:
Lattice-Based IBE with Equality Test in Standard Model. 19-40 - Shintaro Terada, Kazuki Yoneyama:
Password-Based Authenticated Key Exchange from Standard Isogeny Assumptions. 41-56
Signatures
- Kang Li, Man Ho Au, Ivan Wang Hei Ho, Yilei Wang:
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature. 59-76 - Shoichi Hirose, Junji Shikata:
History-Free Sequential Aggregate MAC Revisited. 77-93 - Zhipeng Wang, Qianhong Wu:
A Practical Lattice-Based Sequential Aggregate Signature. 94-109
Encryption
- Xueqiao Liu, Hongbo Li, Guomin Yang, Willy Susilo, Joseph Tonien, Qiong Huang:
Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search. 113-129 - Hiroaki Yamamoto, Yoshihiro Wachi, Hiroshi Fujiwara:
Space-Efficient and Secure Substring Searchable Symmetric Encryption Using an Improved DAWG. 130-148 - Sha Ma, Qiong Huang, Ximing Li, Meiyan Xiao:
Plaintext-Verifiably-Checkable Encryption. 149-166 - Dongxue Pan, Bei Liang, Hongda Li, Peifang Ni:
Hierarchical Functional Signcryption: Notion and Construction. 167-185
Attack
- Ashley Fraser, Elizabeth A. Quaglia, Ben Smyth:
A Critique of Game-Based Definitions of Receipt-Freeness for Voting. 189-205 - Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem. 206-221 - Fangguo Zhang, Shengli Liu:
Solving ECDLP via List Decoding. 222-244
Protocols
- Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Hua Shen, Yi Mu:
Provably Secure Proactive Secret Sharing Without the Adjacent Assumption. 247-264 - Kyosuke Yamashita, Mehdi Tibouchi, Masayuki Abe:
A Coin-Free Oracle-Based Augmented Black Box Framework. 265-272
Blockchain
- Zeming Lu, Zoe Lin Jiang, Yulin Wu, Xuan Wang, Yantao Zhong:
A Lattice-Based Anonymous Distributed E-Cash from Bitcoin. 275-287 - Haibo Tian, Peiran Luo, Yinxue Su:
A Centralized Digital Currency System with Rich Functions. 288-302 - Bin Yu, Shabnam Kasra Kermanshahi, Amin Sakzad, Surya Nepal:
Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks. 303-318
Short Papers
- Zhi Zhou, Xu Chen:
On-demand Privacy Preservation for Cost-Efficient Edge Intelligence Model Training. 321-329 - Atsushi Fujioka, Katsuyuki Takashima, Kazuki Yoneyama:
One-Round Authenticated Group Key Exchange from Isogenies. 330-338 - Yi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Dawu Gu, Fei Huan, Yanxue Jia:
TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility. 339-346 - Xiang Li, Hui Tian, Jianting Ning:
Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud Computing. 347-354 - Laltu Sardar, Sushmita Ruj:
FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE Scheme. 355-371 - Chaochen Shi, Jiangshan Yu:
A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection. 372-380
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.