Provable SecurityPub Date : 2016-11-10DOI: 10.1007/978-3-319-47422-9_18
Sujuan Li, Y. Mu, Mingwu Zhang, Futai Zhang
{"title":"Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage","authors":"Sujuan Li, Y. Mu, Mingwu Zhang, Futai Zhang","doi":"10.1007/978-3-319-47422-9_18","DOIUrl":"https://doi.org/10.1007/978-3-319-47422-9_18","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125079549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Provable SecurityPub Date : 2015-11-24DOI: 10.1007/978-3-319-26059-4_26
Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng
{"title":"Unique Signature with Short Output from CDH Assumption","authors":"Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng","doi":"10.1007/978-3-319-26059-4_26","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_26","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115141517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Provable SecurityPub Date : 2015-11-24DOI: 10.1007/978-3-319-26059-4_8
Suvradip Chakraborty, G. Paul, C. Rangan
{"title":"Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction","authors":"Suvradip Chakraborty, G. Paul, C. Rangan","doi":"10.1007/978-3-319-26059-4_8","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_8","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121654735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Provable SecurityPub Date : 2015-11-24DOI: 10.1007/978-3-319-26059-4_20
B. David, Rafael Dowsley, R. Katti, Anderson C. A. Nascimento
{"title":"Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols","authors":"B. David, Rafael Dowsley, R. Katti, Anderson C. A. Nascimento","doi":"10.1007/978-3-319-26059-4_20","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_20","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122610917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Provable SecurityPub Date : 2015-11-24DOI: 10.1007/978-3-319-26059-4_12
Xu Yang, Wei Wu, Joseph K. Liu, Xiaofeng Chen
{"title":"Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach","authors":"Xu Yang, Wei Wu, Joseph K. Liu, Xiaofeng Chen","doi":"10.1007/978-3-319-26059-4_12","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_12","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125468830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}