


default search action
ProvSec 2017: Xi'an, China
- Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li:

Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10592, Springer 2017, ISBN 978-3-319-68636-3
Secure Cloud Storage and Computing
- Zhi Liang, Qianhong Wu, Weiran Liu, Jianwei Liu, Fu Xiao:

Provably Secure Self-Extractable Encryption. 3-23 - Yunling Wang, Jianfeng Wang

, Shifeng Sun, Joseph K. Liu, Willy Susilo
, Xiaofeng Chen:
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. 24-38 - Ru Meng, Yanwei Zhou, Jianting Ning, Kaitai Liang

, Jinguang Han
, Willy Susilo
:
An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups. 39-56 - Yang Liu, Xingxin Li, Youwen Zhu, Jian Wang, Zhe Liu:

Secure Multi-label Classification over Encrypted Data in Cloud. 57-73 - Junzuo Lai, Jie Xiong, Chuansheng Wang, Guangzheng Wu, Yanling Li:

A Secure Cloud Backup System with Deduplication and Assured Deletion. 74-83
Digital Signature and Authentication
- Gunnar Hartung, Björn Kaidel, Alexander Koch

, Jessica Koch, Dominik Hartmann:
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures. 87-106 - Zhen Wang, Xiling Luo, Qianhong Wu:

Verifiably Encrypted Group Signatures. 107-126 - Shengke Zeng, Yi Mu, Guomin Yang

, Mingxing He:
Deniable Ring Authentication Based on Projective Hash Functions. 127-143
Authenticated Encryption and Key Exchange
- Ping Zhang, Peng Wang

, Honggang Hu, Changsong Cheng, Wenke Kuai:
INT-RUP Security of Checksum-Based Authenticated Encryption. 147-166 - Suvradip Chakraborty, Janaka Alawatugoda

, C. Pandu Rangan:
Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting. 167-187 - Haiyang Xue

, Bao Li, Jingnan He:
New Framework of Password-Based Authenticated Key Exchange from Only-One Lossy Encryption. 188-198
Security Models
- Masayuki Fukumitsu, Shingo Hasegawa:

Impossibility of the Provable Security of the Schnorr Signature from the One-More DL Assumption in the Non-programmable Random Oracle Model. 201-218 - Fangguo Zhang

:
Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem. 219-235 - Yuan Chen, Qingkuan Dong, Qiqi Lai:

Natural sd-RCCA Secure Public-Key Encryptions. 236-250 - Ahto Buldas

, Matthias Geihs, Johannes Buchmann:
Long-Term Secure Time-Stamping Using Preimage-Aware Hash Functions - (Short Version). 251-260 - Hanlin Liu, Di Yan

, Yu Yu, Shuoyao Zhao:
On the Hardness of Sparsely Learning Parity with Noise. 261-267
Lattice and Post-quantum Cryptography
- Bagus Santoso

, Chunhua Su:
Provable Secure Post-Quantum Signature Scheme Based on Isomorphism of Polynomials in Quantum Random Oracle Model. 271-284 - Long Chen, Zhenfeng Zhang:

Bootstrapping Fully Homomorphic Encryption with Ring Plaintexts Within Polynomial Noise. 285-304 - San Ling

, Khoa Nguyen
, Huaxiong Wang, Juanyang Zhang:
Revocable Predicate Encryption from Lattices. 305-326
Public Key Encryption and Signcryption
- Kamalesh Acharya

, Ratna Dutta:
Provable Secure Constructions for Broadcast Encryption with Personalized Messages. 329-348 - Fatemeh Rezaeibagha

, Yi Mu, Shiwei Zhang, Xiaofen Wang:
Provably Secure Homomorphic Signcryption. 349-360 - Dali Zhu, Renjun Zhang, Dingding Jia:

Public-Key Encryption with Simulation-Based Sender Selective-Opening Security. 361-380 - Nelly Fazio, Rosario Gennaro, Tahereh Jafarikhah, William E. Skeith III:

Homomorphic Secret Sharing from Paillier Encryption. 381-399 - Hui Cui

, Man Ho Au
, Baodong Qin, Robert H. Deng
, Xun Yi
:
Fuzzy Public-Key Encryption Based on Biometric Data. 400-409
Proxy Re-encryption and Functional Encryption
- S. Sharmila Deva Selvi, Arinjita Paul, Chandrasekaran Pandu Rangan:

An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing. 413-433 - Vincenzo Iovino

, Karol Zebrowski:
Mergeable Functional Encryption. 434-451
Protocols
- Zifeng Xu, Fucai Zhou, Yuxi Li, Jian Xu, Qiang Wang:

Private Subgraph Matching Protocol. 455-470 - Dimaz Ankaa Wijaya, Joseph K. Liu, Dony Ariadi Suwarsono, Peng Zhang:

A New Blockchain-Based Value-Added Tax System. 471-486 - Xavier Bultel, Manik Lal Das, Hardik Gajera, David Gérault, Matthieu Giraud, Pascal Lafourcade

:
Verifiable Private Polynomial Evaluation. 487-506

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














