ProvSec C

24 papers

YearTitle / Authors
2016A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model.
Jianye Huang, Qiong Huang, Chunhua Pan
2016A Homomorphic Proxy Re-encryption from Lattices.
Chunguang Ma, Juyan Li, Weiping Ouyang
2016A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress).
Jun Gao, Jiaqi Wang, Ning Lu, Fang Zhu, Wenbo Shi
2016Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation.
Gang Yu, Zhenfu Cao, Guang Zeng, Wenbao Han
2016An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures.
Hui Cui, Robert H. Deng, Guowei Wu, Junzuo Lai
2016Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update.
Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo
2016Efficient Asymmetric Index Encapsulation Scheme for Named Data.
Rong Ma, Zhenfu Cao
2016Efficient Dynamic Provable Data Possession from Dynamic Binary Tree.
Changfeng Li, Huaqun Wang
2016ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure.
Jianhong Zhang, Pengyan Li, Zhibin Sun, Jian Mao
2016Identity-Based Batch Provable Data Possession.
Fucai Zhou, Su Peng, Jian Xu, Zifeng Xu
2016Integrity Analysis of Authenticated Encryption Based on Stream Ciphers.
Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata
2016Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing.
Fucai Zhou, Yuxi Li, Alex X. Liu, Muqing Lin, Zifeng Xu
2016Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction.
Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto
2016Oblivious Keyword Search with Authorization.
Peng Jiang, Xiaofen Wang, Jianchang Lai, Fuchun Guo, Rongmao Chen
2016One-Round Attribute-Based Key Exchange in the Multi-party Setting.
Yangguang Tian, Guomin Yang, Yi Mu, Kaitai Liang, Yong Yu
2016Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme.
Zengpeng Li, Steven D. Galbraith, Chunguang Ma
2016Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings
Liqun Chen, Jinguang Han
2016Secure Naïve Bayesian Classification over Encrypted Data in Cloud.
Xingxin Li, Youwen Zhu, Jian Wang
2016Secure and Efficient Construction of Broadcast Encryption with Dealership.
Kamalesh Acharya, Ratna Dutta
2016Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message.
Yong Xie, Libing Wu, Yubo Zhang, Zhiyan Xu
2016Towards Certificate-Based Group Encryption.
Yili Ren, Xiling Luo, Qianhong Wu, Joseph K. Liu, Peng Zhang
2016Towards Proofs of Ownership Beyond Bounded Leakage.
Yongjun Zhao, Sherman S. M. Chow
2016Universally Composable Cryptographic Role-Based Access Control.
Bin Liu, Bogdan Warinschi
2016Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage.
Sujuan Li, Yi Mu, Mingwu Zhang, Futai Zhang