


default search action
ProvSec 2007: Wollongong, Australia
- Willy Susilo

, Joseph K. Liu, Yi Mu:
Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings. Lecture Notes in Computer Science 4784, Springer 2007, ISBN 978-3-540-75669-9
Authentication
- Brian A. LaMacchia, Kristin E. Lauter, Anton Mityagin:

Stronger Security of Authenticated Key Exchange. 1-16 - Christophe Tartary, Huaxiong Wang, Josef Pieprzyk

:
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. 17-34
Asymmetric Encryption
- Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols

:
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. 35-50 - Palash Sarkar, Sanjit Chatterjee:

Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks. 51-67
Signature
- Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:

A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. 68-84 - Rafael Castro, Ricardo Dahab:

Two Notes on the Security of Certificateless Signatures. 85-102 - Lei Zhang, Futai Zhang, Wei Wu:

A Provably Secure Ring Signature Scheme in Certificateless Cryptography. 103-121
Protocol and Proving Technique
- Sébastien Canard, Iwen Coisel, Jacques Traoré:

Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use. 122-137 - Ahto Buldas, Aivo Jürgenson:

Does Secure Time-Stamping Imply Collision-Free Hash Functions? 138-150 - Reynald Affeldt

, Miki Tanaka, Nicolas Marti:
Formal Proof of Provable Security by Game-Playing in a Proof Assistant. 151-168
Authentication and Symmetric Encryption (Short Papers)
- Raphael C.-W. Phan, Kim-Kwang Raymond Choo, Swee-Huay Heng:

Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication. 169-177 - Wei Li, Dawu Gu:

An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security. 178-187 - Ermaliza Razali, Raphael C.-W. Phan, Marc Joye:

On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers. 188-197
Signature (Short Papers)
- Jin Li, Tsz Hon Yuen, Kwangjo Kim:

Practical Threshold Signatures Without Random Oracles. 198-207 - Jin Li, Kwangjo Kim, Fangguo Zhang

, Xiaofeng Chen:
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature. 208-217
Asymmetric Encryption (Short Papers)
- Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:

Formal Security Treatments for Signatures from Identity-Based Encryption. 218-227 - Thomas Fuhr, Pascal Paillier:

Decryptable Searchable Encryption. 228-236

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














