Provable SecurityPub Date : 2015-11-24DOI: 10.1007/978-3-319-26059-4_7
Kazumasa Shinagawa, T. Mizuki, Jacob C. N. Schuldt, K. Nuida, Naoki Kanayama, T. Nishide, Goichiro Hanaoka, E. Okamoto
{"title":"Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards","authors":"Kazumasa Shinagawa, T. Mizuki, Jacob C. N. Schuldt, K. Nuida, Naoki Kanayama, T. Nishide, Goichiro Hanaoka, E. Okamoto","doi":"10.1007/978-3-319-26059-4_7","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_7","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134461658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Provable SecurityPub Date : 2015-11-24DOI: 10.1007/978-3-319-26059-4_6
S. Vaudenay
{"title":"Sound Proof of Proximity of Knowledge","authors":"S. Vaudenay","doi":"10.1007/978-3-319-26059-4_6","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_6","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133685958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Provable SecurityPub Date : 2015-11-24DOI: 10.1007/978-3-319-26059-4_27
Yohei Watanabe, Junji Shikata
{"title":"Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage","authors":"Yohei Watanabe, Junji Shikata","doi":"10.1007/978-3-319-26059-4_27","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_27","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132331126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Provable SecurityPub Date : 2015-11-24DOI: 10.1007/978-3-319-26059-4_24
Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Z. Cao, Yunlei Zhao
{"title":"Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model","authors":"Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Z. Cao, Yunlei Zhao","doi":"10.1007/978-3-319-26059-4_24","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_24","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121278539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Provable SecurityPub Date : 2015-11-24DOI: 10.1007/978-3-319-26059-4_5
Christian Badertscher, Christian Matt, U. Maurer, P. Rogaway, Björn Tackmann
{"title":"Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer","authors":"Christian Badertscher, Christian Matt, U. Maurer, P. Rogaway, Björn Tackmann","doi":"10.1007/978-3-319-26059-4_5","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_5","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121588689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}