default search action
ProvSec 2013: Melaka, Malaysia
- Willy Susilo, Reza Reyhanitabar:
Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings. Lecture Notes in Computer Science 8209, Springer 2013, ISBN 978-3-642-41226-4
Invited Talk
- Serge Vaudenay:
On Modeling Terrorist Frauds - Addressing Collusion in Distance Bounding Protocols. 1-20
Key Exchange Protocols
- Hai Huang:
Authenticated Key Exchange Protocols Based on Factoring Assumption. 21-37 - S. Sree Vivek, S. Sharmila Deva Selvi, Layamrudhaa Renganathan Venkatesan, C. Pandu Rangan:
Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round. 38-58 - Cristian Ene, Clémentine Gritti, Yassine Lakhnech:
CIL Security Proof for a Password-Based Key Exchange. 59-85
Security Models
- Prabhanjan Ananth, Raghav Bhaskar:
Non Observability in the Random Oracle Model. 86-103 - Angsuman Das, Sabyasachi Dutta, Avishek Adhikari:
Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture. 104-120 - Ioana Boureanu, Serge Vaudenay:
Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges. 121-138 - Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Joseph K. Liu:
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage. 139-153
Signature and Signcryption Schemes
- Weiwei Liu, Guomin Yang, Yi Mu, Jiannan Wei:
k-time Proxy Signature: Formal Definition and Efficient Construction. 154-164 - Hui Cui, Yi Mu, Man Ho Au:
Anonymous Signcryption against Linear Related-Key Attacks. 165-183
Authenticated Encryption
- Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata:
Improved Authenticity Bound of EAX, and Refinements. 184-201 - Kazumaro Aoki, Kan Yasuda:
The Security of the OCB Mode of Operation without the SPRP Assumption. 202-220 - Kazuhiko Minematsu:
A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes. 221-238
Theory
- Xianhui Lu, Bao Li, Yamin Liu:
How to Remove the Exponent GCD in HK09. 239-248 - Nirattaya Khamsemanan, William E. Skeith III:
Translation-Randomizable Distributions via Random Walks. 249-270
Public Key Encryption
- Dingding Jia, Xianhui Lu, Bao Li, Qixiang Mei:
RKA Secure PKE Based on the DDH and HR Assumptions. 271-287 - Y. Sreenivasa Rao, Ratna Dutta:
Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext. 288-308 - Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka:
Factoring-Based Proxy Re-Encryption Schemes. 309-329 - Hui Guo, Zhenfeng Zhang, Jiang Zhang, Cheng Chen:
Towards a Secure Certificateless Proxy Re-Encryption Scheme. 330-346
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.