default search action
ProvSec 2020: Singapore
- Khoa Nguyen, Wenling Wu, Kwok-Yan Lam, Huaxiong Wang:
Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings. Lecture Notes in Computer Science 12505, Springer 2020, ISBN 978-3-030-62575-7
Signature Schemes
- Remi Clarisse, Olivier Sanders:
Group Signature Without Random Oracles from Randomizable Signatures. 3-23 - Sébastien Canard, Adela Georgescu, Guillaume Kaim, Adeline Roux-Langlois, Jacques Traoré:
Constant-Size Lattice-Based Group Signature with Forward Security in the Standard Model. 24-44 - Masayuki Fukumitsu, Shingo Hasegawa:
A Lattice-Based Provably Secure Multisignature Scheme in Quantum Random Oracle Model. 45-64 - Kaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, Kazuo Ohta:
Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers. 65-84 - Kaisei Kajita, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi:
Short Lattice Signatures in the Standard Model with Efficient Tag Generation. 85-102 - Takashi Nishide:
One-Time Delegation of Unlinkable Signing Rights and Its Application. 103-123 - Kyohei Sudo, Masayuki Tezuka, Keisuke Hara, Yusuke Yoshida, Keisuke Tanaka:
Watermarkable Signature with Computational Function Preserving. 124-144 - Fei Zhu, Xun Yi, Sharif Abuadbba, Ibrahim Khalil, Xu Yang, Surya Nepal, Xinyi Huang:
Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments. 145-165
Encryption Schemes and NIZKs
- Tapas Pal, Ratna Dutta:
Semi-Adaptively Secure Offline Witness Encryption from Puncturable Witness PRF. 169-189 - Moesfa Soeheila Mohamad, Ji-Jian Chin:
Improved Indistinguishability for Searchable Symmetric Encryption. 190-212 - Yi Lu, Keisuke Hara, Keisuke Tanaka:
Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions. 213-233 - Shunli Ma, Yi Deng, Mengqiu Bai, Debiao He, Jiang Zhang, Xiang Xie:
A Practical NIZK Argument for Confidential Transactions over Account-Model Blockchain. 234-253
Secure Machine Learning and Multiparty Computation
- Radu Ciucanu, Anatole Delabrouille, Pascal Lafourcade, Marta Soare:
Secure Cumulative Reward Maximization in Linear Stochastic Bandits. 257-277 - Chao Jin, Mohamed Ragab, Khin Mi Mi Aung:
Secure Transfer Learning for Machine Fault Diagnosis Under Different Operating Conditions. 278-297 - Hikaru Tsuchida, Takashi Nishide, Yusaku Maeda:
Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring. 298-317 - Luka Music, Céline Chevalier, Elham Kashefi:
Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses. 318-337
Secret Sharing Schemes
- Jodie Knapp, Elizabeth A. Quaglia:
Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles. 341-360 - Jian Ding, Changlu Lin, Fuchun Lin:
Optimal Threshold Changeable Secret Sharing with New Threshold Change Range. 361-378
Security Analyses
- Ke Wang, Zhenfeng Zhang, Haodong Jiang:
Key Recovery Under Plaintext Checking Attack on LAC. 381-401 - Ke Wang, Zhenfeng Zhang, Haodong Jiang:
Security of Two NIST Candidates in the Presence of Randomness Reuse. 402-421
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.