ProvSec C

22 papers

YearTitle / Authors
2012Anonymous Identity-Based Hash Proof System and Its Applications.
Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
2012Authenticated Key Exchange with Entities from Different Settings and Varied Groups.
Yanfei Guo, Zhenfeng Zhang
2012Codes Based Tracing and Revoking Scheme with Constant Ciphertext.
Xingwen Zhao, Hui Li
2012Combined Public-Key Schemes: The Case of ABE and ABS.
Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng
2012Deterministic Random Oracles.
Margus Niitsoo
2012Efficient Escrow-Free Identity-Based Signature.
Yunmei Zhang, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo
2012Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures.
Tapas Pandit, Rana Barua
2012Efficient and Random Oracle-Free Conditionally Anonymous Ring Signature.
Shengke Zeng, Zhiguang Qin, Qing Lu, Qinyi Li
2012Fully Secure Doubly-Spatial Encryption under Simple Assumptions.
Cheng Chen, Zhenfeng Zhang, Dengguo Feng
2012ID Based Signcryption Scheme in Standard Model.
S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan
2012LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation.
Bo Yang, Mingwu Zhang
2012On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties.
Reza Reyhanitabar, Willy Susilo
2012On the (Non-)Equivalence of UC Security Notions.
Oana Ciobotaru
2012One-Move Convertible Nominative Signature in the Standard Model.
Dennis Y. W. Liu, Duncan S. Wong
2012Perfect Keyword Privacy in PEKS Systems.
Mototsugu Nishioka
2012Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings
Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu
2012Revisiting a Secret Sharing Approach to Network Codes.
ZhaoHui Tang, Hoon Wei Lim, Huaxiong Wang
2012Secure Keyword Search Using Bloom Filter with Specified Character Positions.
Takanori Suga, Takashi Nishide, Kouichi Sakurai
2012Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices.
Ioana Boureanu, Serge Vaudenay
2012Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles.
Zheng Yang, Jörg Schwenk
2012Symmetric Inner-Product Predicate Encryption Based on Three Groups.
Masayuki Yoshino, Noboru Kunihiro, Ken Naganuma, Hisayoshi Sato
2012Tools over Bilinear Groups for Modular Design of Cryptographic Tasks.
Masayuki Abe