Provable Security最新文献

筛选
英文 中文
A Formal Dynamic Verification of Choreographed Web Services Conversations 编排的Web服务对话的正式动态验证
Provable Security Pub Date : 2015-11-24 DOI: 10.1007/978-3-319-26059-4_19
Karim Dahmani, Mahjoub Langar, R. Robbana
{"title":"A Formal Dynamic Verification of Choreographed Web Services Conversations","authors":"Karim Dahmani, Mahjoub Langar, R. Robbana","doi":"10.1007/978-3-319-26059-4_19","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_19","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126792439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attribute-Based Encryption Resilient to Auxiliary Input 基于属性的加密对辅助输入具有弹性
Provable Security Pub Date : 2015-11-24 DOI: 10.1007/978-3-319-26059-4_21
Zhiwei Wang, S. Yiu
{"title":"Attribute-Based Encryption Resilient to Auxiliary Input","authors":"Zhiwei Wang, S. Yiu","doi":"10.1007/978-3-319-26059-4_21","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_21","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133859589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards 使用正多边形牌的小洗牌复杂度的多方计算
Provable Security Pub Date : 2015-11-24 DOI: 10.1007/978-3-319-26059-4_7
Kazumasa Shinagawa, T. Mizuki, Jacob C. N. Schuldt, K. Nuida, Naoki Kanayama, T. Nishide, Goichiro Hanaoka, E. Okamoto
{"title":"Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards","authors":"Kazumasa Shinagawa, T. Mizuki, Jacob C. N. Schuldt, K. Nuida, Naoki Kanayama, T. Nishide, Goichiro Hanaoka, E. Okamoto","doi":"10.1007/978-3-319-26059-4_7","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_7","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134461658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Sound Proof of Proximity of Knowledge 知识接近的声音证明
Provable Security Pub Date : 2015-11-24 DOI: 10.1007/978-3-319-26059-4_6
S. Vaudenay
{"title":"Sound Proof of Proximity of Knowledge","authors":"S. Vaudenay","doi":"10.1007/978-3-319-26059-4_6","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_6","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133685958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure 一种改进的RSA噪声密钥恢复攻击方法及对策
Provable Security Pub Date : 2015-11-24 DOI: 10.1007/978-3-319-26059-4_4
N. Kunihiro
{"title":"An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure","authors":"N. Kunihiro","doi":"10.1007/978-3-319-26059-4_4","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_4","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127005072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage 基于通信与存储权衡的密钥预分配系统的无条件安全广播加密构造
Provable Security Pub Date : 2015-11-24 DOI: 10.1007/978-3-319-26059-4_27
Yohei Watanabe, Junji Shikata
{"title":"Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage","authors":"Yohei Watanabe, Junji Shikata","doi":"10.1007/978-3-319-26059-4_27","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_27","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132331126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model 非可编程随机Oracle模型中哈希签名的黑盒分离
Provable Security Pub Date : 2015-11-24 DOI: 10.1007/978-3-319-26059-4_24
Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Z. Cao, Yunlei Zhao
{"title":"Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model","authors":"Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Z. Cao, Yunlei Zhao","doi":"10.1007/978-3-319-26059-4_24","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_24","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121278539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Reset-Secure Identity-Based Identification Schemes Without Pairings 重置无配对的安全身份识别方案
Provable Security Pub Date : 2015-11-24 DOI: 10.1007/978-3-319-26059-4_13
Ji-Jian Chin, Hiroaki Anada, Syh-Yuan Tan
{"title":"Reset-Secure Identity-Based Identification Schemes Without Pairings","authors":"Ji-Jian Chin, Hiroaki Anada, Syh-Yuan Tan","doi":"10.1007/978-3-319-26059-4_13","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_13","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115979441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer 增强型安全通道和TLS 1.3记录层的目标
Provable Security Pub Date : 2015-11-24 DOI: 10.1007/978-3-319-26059-4_5
Christian Badertscher, Christian Matt, U. Maurer, P. Rogaway, Björn Tackmann
{"title":"Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer","authors":"Christian Badertscher, Christian Matt, U. Maurer, P. Rogaway, Björn Tackmann","doi":"10.1007/978-3-319-26059-4_5","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_5","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121588689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Constrained Verifiable Random Functions from Indistinguishability Obfuscation 不可区分混淆下的约束可验证随机函数
Provable Security Pub Date : 2015-11-24 DOI: 10.1007/978-3-319-26059-4_3
Bei Liang, Hongda Li, Jinyong Chang
{"title":"Constrained Verifiable Random Functions from Indistinguishability Obfuscation","authors":"Bei Liang, Hongda Li, Jinyong Chang","doi":"10.1007/978-3-319-26059-4_3","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_3","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"75 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134088123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信