ProvSec C

19 papers

YearTitle / Authors
2010A Calculus for Game-Based Security Proofs.
David Nowak, Yu Zhang
2010A Framework for Constructing Convertible Undeniable Signatures.
Ryo Kikuchi, Le Trieu Phong, Wakaha Ogata
2010A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).
Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong
2010A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication.
Keita Emura, Atsuko Miyaji, Kazumasa Omote
2010An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation.
Keita Emura, Atsuko Miyaji, Kazumasa Omote
2010Automating Computational Proofs for Public-Key-Based Key Exchange.
Long Ngo, Colin Boyd, Juan Manuel González Nieto
2010Collision Resistant Double-Length Hashing.
Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks
2010Cryptographic Protocols from Lattices.
Eike Kiltz
2010Distinguishing Distributions Using Chernoff Information.
Thomas Baignères, Pouyan Sepehrdad, Serge Vaudenay
2010Efficient Broadcast Encryption with Personalized Messages.
Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa
2010Efficient Confirmer Signatures from the "Signature of a Commitment" Paradigm.
Laila El Aimani
2010Formal and Precise Analysis of Soundness of Several Shuffling Schemes.
Kun Peng, Feng Bao
2010Fully Secure Threshold Unsigncryption.
Javier Herranz, Alexandre Ruiz, Germán Sáez
2010Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks.
Hiroaki Anada, Seiko Arita
2010Identity Based Public Verifiable Signcryption Scheme.
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010Improved Zero-Knowledge Identification with Lattices.
Pierre-Louis Cayrel, Richard Lindner, Markus Rückert, Rosemberg Silva
2010Interpreting Hash Function Security Proofs.
Juraj Sarinay
2010Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings
Swee-Huay Heng, Kaoru Kurosawa
2010Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption.
Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro