ProvSec C

28 papers

YearTitle / Authors
2015A Formal Dynamic Verification of Choreographed Web Services Conversations.
Karim Dahmani, Mahjoub Langar, Riadh Robbana
2015An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure.
Noboru Kunihiro
2015Attribute-Based Encryption Resilient to Auxiliary Input.
Zhiwei Wang, Siu-Ming Yiu
2015Attribute-Based Encryption for Finite Automata from LWE.
Xavier Boyen, Qinyi Li
2015Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer.
Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann
2015BetterTimes - Privacy-Assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields.
Per A. Hallgren, Martín Ochoa, Andrei Sabelfeld
2015Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao
2015Constrained Verifiable Random Functions from Indistinguishability Obfuscation.
Bei Liang, Hongda Li, Jinyong Chang
2015Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage.
Yohei Watanabe, Junji Shikata
2015Efficient Key Authentication Service for Secure End-to-End Communications.
Mohammad Etemad, Alptekin Küpçü
2015Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries.
Sumit Kumar Debnath, Ratna Dutta
2015Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols.
Bernardo Machado David, Rafael Dowsley, Raj S. Katti, Anderson C. A. Nascimento
2015Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction.
Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan
2015From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions.
Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges
2015Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher.
Yusuke Naito
2015Functional Signcryption: Notion, Construction, and Applications.
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2015Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach.
Xu Yang, Wei Wu, Joseph K. Liu, Xiaofeng Chen
2015Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards.
Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
2015On Privacy for RFID.
Serge Vaudenay
2015On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers.
Maciej Skorski
2015PPAE: Practical Parazoa Authenticated Encryption Family.
Donghoon Chang, Sumesh Manjunath R., Somitra Kumar Sanadhya
2015Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings
Man Ho Au, Atsuko Miyaji
2015Provably Secure Identity Based Provable Data Possession.
Yong Yu, Yafang Zhang, Yi Mu, Willy Susilo, Hongyu Liu
2015Reset-Secure Identity-Based Identification Schemes Without Pairings.
Ji-Jian Chin, Hiroaki Anada, Syh-Yuan Tan
2015Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes.
David Derler, Daniel Slamanig
2015Sound Proof of Proximity of Knowledge.
Serge Vaudenay
2015Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders.
Katsuyuki Takashima, Atsushi Takayasu
2015Unique Signature with Short Output from CDH Assumption.
Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng