Provable SecurityPub Date : 2020-11-29DOI: 10.1007/978-3-030-62576-4_5
Kaisei Kajita, Kazuto Ogawa, K. Nuida, T. Takagi
{"title":"Short Lattice Signatures in the Standard Model with Efficient Tag Generation","authors":"Kaisei Kajita, Kazuto Ogawa, K. Nuida, T. Takagi","doi":"10.1007/978-3-030-62576-4_5","DOIUrl":"https://doi.org/10.1007/978-3-030-62576-4_5","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127839140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Provable SecurityPub Date : 2020-11-29DOI: 10.1007/978-3-030-62576-4_15
Hikaru Tsuchida, T. Nishide, Yusaku Maeda
{"title":"Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring","authors":"Hikaru Tsuchida, T. Nishide, Yusaku Maeda","doi":"10.1007/978-3-030-62576-4_15","DOIUrl":"https://doi.org/10.1007/978-3-030-62576-4_15","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130469671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Provable SecurityPub Date : 2020-11-28DOI: 10.1007/978-3-030-62576-4_13
Radu Ciucanu, Anatole Delabrouille, P. Lafourcade, Marta Soare
{"title":"Secure Cumulative Reward Maximization in Linear Stochastic Bandits","authors":"Radu Ciucanu, Anatole Delabrouille, P. Lafourcade, Marta Soare","doi":"10.1007/978-3-030-62576-4_13","DOIUrl":"https://doi.org/10.1007/978-3-030-62576-4_13","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122459464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Provable SecurityPub Date : 2019-10-01DOI: 10.1007/978-3-030-31919-9_8
Hiroaki Yamamoto, Y. Wachi, H. Fujiwara
{"title":"Space-Efficient and Secure Substring Searchable Symmetric Encryption Using an Improved DAWG","authors":"Hiroaki Yamamoto, Y. Wachi, H. Fujiwara","doi":"10.1007/978-3-030-31919-9_8","DOIUrl":"https://doi.org/10.1007/978-3-030-31919-9_8","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117036311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Provable SecurityPub Date : 2019-10-01DOI: 10.1007/978-3-030-31919-9_4
Kang Li, M. Au, I. W. Ho, Yilei Wang
{"title":"An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature","authors":"Kang Li, M. Au, I. W. Ho, Yilei Wang","doi":"10.1007/978-3-030-31919-9_4","DOIUrl":"https://doi.org/10.1007/978-3-030-31919-9_4","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115900533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}