ProvSec C

22 papers

YearTitle / Authors
2009A Brief History of Security Models for Confidentiality.
Alexander W. Dent
2009An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles.
Daisuke Moriyama, Tatsuaki Okamoto
2009Anonymous Conditional Proxy Re-encryption without Random Oracle.
Liming Fang, Willy Susilo, Jiandong Wang
2009Anonymous Signatures Revisited.
Vishal Saraswat, Aaram Yun
2009Breaking and Fixing of an Identity Based Multi-Signcryption Scheme.
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009Chosen-Ciphertext Secure RSA-Type Cryptosystems.
Benoît Chevallier-Mames, Marc Joye
2009Comparing
Berkant Ustaoglu
2009Efficient Non-interactive Universally Composable String-Commitment Schemes.
Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka
2009GUC-Secure Set-Intersection Computation.
Yuan Tian, Hao Zhang
2009How to Prove Security of a Signature with a Tighter Security Reduction.
Fuchun Guo, Yi Mu, Willy Susilo
2009Identity-Based Verifiably Encrypted Signatures without Random Oracles.
Lei Zhang, Qianhong Wu, Bo Qin
2009Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?
Man Ho Au, Willy Susilo, Yi Mu
2009On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions.
Eiichiro Fujisaki, Ryo Nishimaki, Keisuke Tanaka
2009Oracle Separation in the Non-uniform Model.
Ahto Buldas, Sven Laur, Margus Niitsoo
2009Password Authenticated Key Exchange Based on RSA in the Three-Party Settings.
E. Dongna, Qingfeng Cheng, Chuangui Ma
2009Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings
Josef Pieprzyk, Fangguo Zhang
2009Self-enforcing Private Inference Control.
Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zhou, Feng Bao
2009Server-Controlled Identity-Based Authenticated Key Exchange.
Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li
2009Spatial Encryption under Simpler Assumption.
Muxin Zhou, Zhenfu Cao
2009Symbolic Methods for Provable Security.
Bogdan Warinschi
2009Twin Signature Schemes, Revisited.
Sven Schäge
2009Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge.
Keita Xagawa, Keisuke Tanaka