ProvSec C

27 papers

YearTitle / Authors
2014A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function.
Shoichi Hirose, Hidenori Kuwakado
2014A Provable Secure Batch Authentication Scheme for EPCGen2 Tags.
Jiageng Chen, Atsuko Miyaji, Chunhua Su
2014A Short Fail-Stop Signature Scheme from Factoring.
Takashi Yamakawa, Nobuaki Kitajima, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
2014Adaptive versus Static Security in the UC Model.
Ivan Damgård, Jesper Buus Nielsen
2014Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack.
Tapas Pandit, Sumit Kumar Pandey, Rana Barua
2014Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures.
Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu
2014Compact Public Key Encryption with Minimum Ideal Property of Hash Functions.
Kazuki Yoneyama, Goichiro Hanaoka
2014Complete Robustness in Identity-Based Encryption.
Hui Cui, Yi Mu, Man Ho Au
2014Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols.
Kazuki Yoneyama
2014Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li
2014Constructing Subspace Membership Encryption through Inner Product Encryption.
Shuichi Katsumata, Noboru Kunihiro
2014Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage.
Lukasz Krzywiecki
2014Efficient (Anonymous) Compact HIBE from Standard Assumptions.
Somindu C. Ramanna, Palash Sarkar
2014Equivalence between MAC, WCR and PRF for Blockcipher Based Constructions.
Nilanjan Datta, Mridul Nandi
2014Fine-Grained Conditional Proxy Re-Encryption and Application.
Yanjiang Yang, Haibing Lu, Jian Weng, Youcheng Zhang, Kouichi Sakurai
2014Forward-Secure Sequential Aggregate Message Authentication Revisited.
Shoichi Hirose, Hidenori Kuwakado
2014Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency.
Yuyu Wang, Keisuke Tanaka
2014How to Use Pseudorandom Generators in Unconditional Security Settings.
Koji Nuida
2014Impossibility of Surjective Icart-Like Encodings.
Mehdi Tibouchi
2014Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation.
Haiyang Xue, Xianhui Lu, Bao Li, Yamin Liu
2014Misuse-Resistant Variants of the OMD Authenticated Encryption Mode.
Reza Reyhanitabar, Serge Vaudenay, Damian Vizár
2014On the Practical Security Bound of GF-NLFSR Structure with SPN Round Function.
Guangyao Zhao, Lei Cheng, Chao Li, Ruilin Li, Xuan Shen
2014Password-Based Authenticated Key Exchange: An Overview.
Michel Abdalla
2014Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
Sherman S. M. Chow, Joseph K. Liu, Lucas Chi Kwong Hui, Siu-Ming Yiu
2014RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security.
Rongxing Lu, Xiaodong Lin, Jun Shao, Kaitai Liang
2014Timed-Release Computational Secret Sharing Scheme and Its Applications.
Yohei Watanabe, Junji Shikata
2014Verifiable Computation in Multiparty Protocols with Honest Majority.
Peeter Laud, Alisa Pankova