ProvSec C

26 papers

YearTitle / Authors
2008A CCA Secure Hybrid Damgård's ElGamal Encryption.
Yvo Desmedt, Duong Hieu Phan
2008A Tamper-Evident Voting Machine Resistant to Covert Channels.
Wei Han, Tao Hao, Dong Zheng, Kefei Chen, Xiaofeng Chen
2008A Universally Composable Framework for the Analysis of Browser-Based Security Protocols.
Sebastian Gajek
2008Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?.
Ahto Buldas, Margus Niitsoo
2008Computationally Sound Symbolic Analysis of Probabilistic Protocols with Ideal Setups.
Zhengqin Luo
2008Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps.
Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li
2008Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.
Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li
2008Efficient and Provably Secure Certificateless Multi-receiver Signcryption.
S. Sharmila Deva Selvi, S. Sree Vivek, Deepanshu Shukla, C. Pandu Rangan
2008Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem.
Huawei Huang, Bo Yang, Shenglin Zhu, Guozhen Xiao
2008How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions.
Emmanuel Bresson, Benoît Chevallier-Mames, Christophe Clavier, Aline Gouget, Pascal Paillier, Thomas Peyrin
2008Leaky Random Oracle (Extended Abstract).
Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta
2008On Proofs of Security for DAA Schemes.
Liqun Chen, Paul Morrissey, Nigel P. Smart
2008On the Equivalence of Generic Group Models.
Tibor Jager, Jörg Schwenk
2008Optimal Online/Offline Signature: How to Sign a Message without Online Computation.
Fuchun Guo, Yi Mu
2008Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings
Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai
2008Relationship of Three Cryptographic Channels in the UC Framework.
Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto
2008Round Optimal Universally Composable Oblivious Transfer Protocols.
Huafei Zhu
2008Round-Optimal Blind Signatures from Waters Signatures.
Kristian Gjøsteen, Lillian Kråkmo
2008Secure Proxy Multi-signature Scheme in the Standard Model.
Zhenhua Liu, Yupu Hu, Hua Ma
2008Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks.
Wei Du, Mingxing He
2008Server-Aided Verification Signatures: Definitions and New Constructions.
Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang
2008The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version.
Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang
2008Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library.
Peeter Laud, Long Ngo
2008Timed-Release Encryption Revisited.
Sherman S. M. Chow, Siu-Ming Yiu
2008Tweakable Pseudorandom Permutation from Generalized Feistel Structure.
Atsushi Mitsuda, Tetsu Iwata
2008Universally Composable Security Analysis of TLS.
Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk