Search dblp for Publications

export results for "toc:db/conf/provsec/provsec2011.bht:"

 download as .bib file

@inproceedings{DBLP:conf/provsec/BartheOB11,
  author       = {Gilles Barthe and
                  Federico Olmedo and
                  Santiago Zanella B{\'{e}}guelin},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Verifiable Security of Boneh-Franklin Identity-Based Encryption},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {68--83},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_7},
  doi          = {10.1007/978-3-642-24316-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/BartheOB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/BaumslagFNSS11,
  author       = {Gilbert Baumslag and
                  Nelly Fazio and
                  Antonio Nicolosi and
                  Vladimir Shpilrain and
                  William E. Skeith III},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Generalized Learning Problems and Applications to Non-commutative
                  Cryptography},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {324--339},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_23},
  doi          = {10.1007/978-3-642-24316-5\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/BaumslagFNSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ChenZF11,
  author       = {Cheng Chen and
                  Zhenfeng Zhang and
                  Dengguo Feng},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size
                  Ciphertext and Constant Computation-Cost},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {84--101},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_8},
  doi          = {10.1007/978-3-642-24316-5\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ChenZF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ChengZZ11,
  author       = {Rong Cheng and
                  Bo Zhang and
                  Fangguo Zhang},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Secure Obfuscation of Encrypted Verifiable Encrypted Signatures},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {188--203},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_14},
  doi          = {10.1007/978-3-642-24316-5\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/ChengZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/DingG11,
  author       = {Ning Ding and
                  Dawu Gu},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Precise Time and Space Simulatable Zero-Knowledge},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {16--33},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_4},
  doi          = {10.1007/978-3-642-24316-5\_4},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/DingG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/GjosteenPS11,
  author       = {Kristian Gj{\o}steen and
                  George Petrides and
                  Asgeir Steine},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {A Novel Framework for Protocol Analysis},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {340--347},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_24},
  doi          = {10.1007/978-3-642-24316-5\_24},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/GjosteenPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Goyal11,
  author       = {Vipul Goyal},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Secure Composition of Cryptographic Protocols},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {2},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_2},
  doi          = {10.1007/978-3-642-24316-5\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Goyal11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Groth11,
  author       = {Jens Groth},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Optimal Structure-Preserving Signatures},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {1},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_1},
  doi          = {10.1007/978-3-642-24316-5\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Groth11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/HanataniMY11,
  author       = {Yoshikazu Hanatani and
                  Hirofumi Muratani and
                  Tomoko Yonemura},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Toward Compact Public Key Encryption Based on {CDH} Assumption via
                  Extended Twin {DH} Assumption},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {138--153},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_11},
  doi          = {10.1007/978-3-642-24316-5\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/HanataniMY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Huang11,
  author       = {Hai Huang},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Strongly Secure One Round Authenticated Key Exchange Protocol with
                  Perfect Forward Security},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {389--397},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_28},
  doi          = {10.1007/978-3-642-24316-5\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Huang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiMZT11,
  author       = {Fagen Li and
                  Fahad Bin Muhaya and
                  Mingwu Zhang and
                  Tsuyoshi Takagi},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Efficient Identity-Based Signcryption in the Standard Model},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {120--137},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_10},
  doi          = {10.1007/978-3-642-24316-5\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LiMZT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiuLD11,
  author       = {Shengli Liu and
                  Junzuo Lai and
                  Robert H. Deng},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {General Construction of Chameleon All-But-One Trapdoor Functions},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {257--265},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_18},
  doi          = {10.1007/978-3-642-24316-5\_18},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LiuLD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LuLMX11,
  author       = {Xianhui Lu and
                  Bao Li and
                  Qixiang Mei and
                  Haixia Xu},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Key-Dependent Message Security for Division Function: Discouraging
                  Anonymous Credential Sharing},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {297--308},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_21},
  doi          = {10.1007/978-3-642-24316-5\_21},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LuLMX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/NaitoYWO11,
  author       = {Yusuke Naito and
                  Kazuki Yoneyama and
                  Lei Wang and
                  Kazuo Ohta},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Security of Practical Cryptosystems Using Merkle-Damg{\aa}rd Hash
                  Function in the Ideal Cipher Model},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {281--296},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_20},
  doi          = {10.1007/978-3-642-24316-5\_20},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/NaitoYWO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/NamikiTY11,
  author       = {Hitoshi Namiki and
                  Keisuke Tanaka and
                  Kenji Yasunaga},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Randomness Leakage in the {KEM/DEM} Framework},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {309--323},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_22},
  doi          = {10.1007/978-3-642-24316-5\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/NamikiTY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/PalmieriP11,
  author       = {Paolo Palmieri and
                  Olivier Pereira},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Secure Two-Party Computation over a Z-Channel},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_3},
  doi          = {10.1007/978-3-642-24316-5\_3},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/PalmieriP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/PanW11,
  author       = {Jiaxin Pan and
                  Libin Wang},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {{TMQV:} {A} Strongly eCK-Secure Diffie-Hellman Protocol without Gap
                  Assumption},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {380--388},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_27},
  doi          = {10.1007/978-3-642-24316-5\_27},
  timestamp    = {Tue, 21 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/PanW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/PhanT11,
  author       = {Duong Hieu Phan and
                  Viet Cuong Trinh},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Identity-Based Trace and Revoke Schemes},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {204--221},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_15},
  doi          = {10.1007/978-3-642-24316-5\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/PhanT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/TanakaYY11,
  author       = {Keisuke Tanaka and
                  Akihiro Yamada and
                  Kenji Yasunaga},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Weak Oblivious Transfer from Strong One-Way Functions},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {34--51},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_5},
  doi          = {10.1007/978-3-642-24316-5\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/TanakaYY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/TonicelliDA11,
  author       = {Rafael Tonicelli and
                  Bernardo Machado David and
                  Vin{\'{\i}}cius de Morais Alves},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Universally Composable Private Proximity Testing},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {222--239},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_16},
  doi          = {10.1007/978-3-642-24316-5\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/TonicelliDA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WeiMZ11,
  author       = {Fushan Wei and
                  Chuangui Ma and
                  Zhenfeng Zhang},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Gateway-Oriented Password-Authenticated Key Exchange Protocol with
                  Stronger Security},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {366--379},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_26},
  doi          = {10.1007/978-3-642-24316-5\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/WeiMZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WuQZD11,
  author       = {Qianhong Wu and
                  Bo Qin and
                  Lei Zhang and
                  Josep Domingo{-}Ferrer},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Fully Distributed Broadcast Encryption},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {102--119},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_9},
  doi          = {10.1007/978-3-642-24316-5\_9},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/WuQZD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YoneyamaZ11,
  author       = {Kazuki Yoneyama and
                  Yunlei Zhao},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Taxonomical Security Consideration of Authenticated Key Exchange Resilient
                  to Intermediate Computation Leakage},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {348--365},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_25},
  doi          = {10.1007/978-3-642-24316-5\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/YoneyamaZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YuenWSH11,
  author       = {Tsz Hon Yuen and
                  Duncan S. Wong and
                  Willy Susilo and
                  Qiong Huang},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Concurrent Signatures with Fully Negotiable Binding Control},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {170--187},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_13},
  doi          = {10.1007/978-3-642-24316-5\_13},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/YuenWSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Zhang11,
  author       = {Bingsheng Zhang},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Simulatable Adaptive Oblivious Transfer with Statistical Receiver's
                  Privacy},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {52--67},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_6},
  doi          = {10.1007/978-3-642-24316-5\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Zhang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Zhang11a,
  author       = {Bingsheng Zhang},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Generic Constant-Round Oblivious Sorting Algorithm for {MPC}},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {240--256},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_17},
  doi          = {10.1007/978-3-642-24316-5\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Zhang11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhangNYT11,
  author       = {Mingwu Zhang and
                  Takashi Nishide and
                  Bo Yang and
                  Tsuyoshi Takagi},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Anonymous Encryption with Partial-Order Subset Delegation Functionality},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {154--169},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_12},
  doi          = {10.1007/978-3-642-24316-5\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhangNYT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhangWW11,
  author       = {Liting Zhang and
                  Wenling Wu and
                  Peng Wang},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {PolyE+CTR: {A} Swiss-Army-Knife Mode for Block Ciphers},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {266--280},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_19},
  doi          = {10.1007/978-3-642-24316-5\_19},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhangWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2011,
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5},
  doi          = {10.1007/978-3-642-24316-5},
  isbn         = {978-3-642-24315-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}