


default search action
ProvSec 2015: Kanazawa, Japan
- Man Ho Au, Atsuko Miyaji:

Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings. Lecture Notes in Computer Science 9451, Springer 2015, ISBN 978-3-319-26058-7
Invited Papers
- Serge Vaudenay:

On Privacy for RFID. 3-20
Fundamental
- Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges:

From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions. 23-42 - Bei Liang, Hongda Li, Jinyong Chang:

Constrained Verifiable Random Functions from Indistinguishability Obfuscation. 43-60 - Noboru Kunihiro

:
An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure. 61-81
Protocol
- Christian Badertscher

, Christian Matt
, Ueli Maurer, Phillip Rogaway, Björn Tackmann:
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer. 85-104 - Serge Vaudenay:

Sound Proof of Proximity of Knowledge. 105-126 - Kazumasa Shinagawa, Takaaki Mizuki

, Jacob C. N. Schuldt, Koji Nuida
, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka
, Eiji Okamoto:
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards. 127-146
Authenticated Encryption and Key Exchange
- Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan:

Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction. 149-166 - Yusuke Naito:

Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher. 167-182 - Mohammad Etemad, Alptekin Küpçü

:
Efficient Key Authentication Service for Secure End-to-End Communications. 183-197 - Donghoon Chang, Sumesh Manjunath R.

, Somitra Kumar Sanadhya
:
PPAE: Practical Parazoa Authenticated Encryption Family. 198-211
Encryption and Identification
- Xu Yang, Wei Wu, Joseph K. Liu, Xiaofeng Chen:

Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach. 215-226 - Ji-Jian Chin

, Hiroaki Anada, Syh-Yuan Tan:
Reset-Secure Identity-Based Identification Schemes Without Pairings. 227-246 - Xavier Boyen, Qinyi Li:

Attribute-Based Encryption for Finite Automata from LWE. 247-267 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:

Functional Signcryption: Notion, Construction, and Applications. 268-288
Privacy and Cloud
- Per A. Hallgren, Martín Ochoa

, Andrei Sabelfeld:
BetterTimes - Privacy-Assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields. 291-309 - Yong Yu

, Yafang Zhang, Yi Mu, Willy Susilo
, Hongyu Liu:
Provably Secure Identity Based Provable Data Possession. 310-325 - Sumit Kumar Debnath

, Ratna Dutta:
Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries. 326-339 - Karim Dahmani, Mahjoub Langar, Riadh Robbana:

A Formal Dynamic Verification of Choreographed Web Services Conversations. 340-353 - Bernardo Machado David, Rafael Dowsley

, Raj S. Katti, Anderson C. A. Nascimento
:
Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols. 354-367
Leakage-Resilient Cryptography and Lattice Cryptography
- Zhiwei Wang, Siu-Ming Yiu:

Attribute-Based Encryption Resilient to Auxiliary Input. 371-390 - Maciej Skorski:

On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers. 391-411 - Katsuyuki Takashima, Atsushi Takayasu:

Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders. 412-431
Signature and Broadcast Encryption
- Zongyang Zhang, Yu Chen, Sherman S. M. Chow

, Goichiro Hanaoka
, Zhenfu Cao
, Yunlei Zhao:
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model. 435-454 - David Derler

, Daniel Slamanig
:
Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes. 455-474 - Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng:

Unique Signature with Short Output from CDH Assumption. 475-488 - Yohei Watanabe, Junji Shikata:

Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage. 489-502

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














