ProvSec C

29 papers

YearTitle / Authors
2011A Novel Framework for Protocol Analysis.
Kristian Gjøsteen, George Petrides, Asgeir Steine
2011Anonymous Encryption with Partial-Order Subset Delegation Functionality.
Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi
2011Concurrent Signatures with Fully Negotiable Binding Control.
Tsz Hon Yuen, Duncan S. Wong, Willy Susilo, Qiong Huang
2011Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost.
Cheng Chen, Zhenfeng Zhang, Dengguo Feng
2011Efficient Identity-Based Signcryption in the Standard Model.
Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi
2011Fully Distributed Broadcast Encryption.
Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer
2011Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security.
Fushan Wei, Chuangui Ma, Zhenfeng Zhang
2011General Construction of Chameleon All-But-One Trapdoor Functions.
Shengli Liu, Junzuo Lai, Robert H. Deng
2011Generalized Learning Problems and Applications to Non-commutative Cryptography.
Gilbert Baumslag, Nelly Fazio, Antonio Nicolosi, Vladimir Shpilrain, William E. Skeith III
2011Generic Constant-Round Oblivious Sorting Algorithm for MPC.
Bingsheng Zhang
2011Identity-Based Trace and Revoke Schemes.
Duong Hieu Phan, Viet Cuong Trinh
2011Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing.
Xianhui Lu, Bao Li, Qixiang Mei, Haixia Xu
2011Optimal Structure-Preserving Signatures.
Jens Groth
2011PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers.
Liting Zhang, Wenling Wu, Peng Wang
2011Precise Time and Space Simulatable Zero-Knowledge.
Ning Ding, Dawu Gu
2011Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings
Xavier Boyen, Xiaofeng Chen
2011Randomness Leakage in the KEM/DEM Framework.
Hitoshi Namiki, Keisuke Tanaka, Kenji Yasunaga
2011Secure Composition of Cryptographic Protocols.
Vipul Goyal
2011Secure Obfuscation of Encrypted Verifiable Encrypted Signatures.
Rong Cheng, Bo Zhang, Fangguo Zhang
2011Secure Two-Party Computation over a Z-Channel.
Paolo Palmieri, Olivier Pereira
2011Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model.
Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta
2011Simulatable Adaptive Oblivious Transfer with Statistical Receiver's Privacy.
Bingsheng Zhang
2011Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security.
Hai Huang
2011TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption.
Jiaxin Pan, Libin Wang
2011Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage.
Kazuki Yoneyama, Yunlei Zhao
2011Toward Compact Public Key Encryption Based on CDH Assumption via Extended Twin DH Assumption.
Yoshikazu Hanatani, Hirofumi Muratani, Tomoko Yonemura
2011Universally Composable Private Proximity Testing.
Rafael Tonicelli, Bernardo Machado David, Vinícius de Morais Alves
2011Verifiable Security of Boneh-Franklin Identity-Based Encryption.
Gilles Barthe, Federico Olmedo, Santiago Zanella-Béguelin
2011Weak Oblivious Transfer from Strong One-Way Functions.
Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga