Provable Security 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings /

This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018. The 21 full and 4 short papers presented were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sec...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Baek, Joonsang (Editor, http://id.loc.gov/vocabulary/relators/edt), Susilo, Willy (Editor, http://id.loc.gov/vocabulary/relators/edt), Kim, Jongkil (Editor, http://id.loc.gov/vocabulary/relators/edt)
Format: Electronic eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2018.
Edition:1st ed. 2018.
Series:Security and Cryptology ; 11192
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • On the Leakage of Corrupted Garbled Circuits
  • Location-Proof System Based on Secure Multi-Party Computations
  • Verifiable Homomorphic Secret Sharing
  • Single Private-Key Generator Security Implies Multiple Private-Key Generators Security
  • Secure Outsourcing of Cryptographic Circuits Manufacturing
  • On the Hardness of Learning Parity with Noise over Rings
  • A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme
  • Multivariate Encryption Schemes Based on the Constrained MQ Problem
  • Token-Based Multi-Input Functional Encryption
  • On the CCA2 Security of McEliece in the Standard Model
  • Efficient Attribute-Based Encryption with BlackBox Traceability
  • A Code-Based Linkable Ring Signature Scheme
  • Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DejaQ and Dual-Form Signature
  • Digital Signatures from the Middle-Product LWE
  • Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation
  • A Simpler Construction of Identity-Based Ring Signatures from Lattices
  • A Generic Construction of Sequential Aggregate MACs from Any MACs
  • Length-Preserving Encryption Based on Single-key Tweakable Block Cipher
  • Modeling Privacy in WiFi Fingerprinting Indoor Localization
  • Security Notions for Cloud Storage and Deduplication
  • Forward Secrecy for SPAKE2
  • User-Mediated Authentication Protocols and Unforgeability for Key Collision
  • BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing
  • Signcryption with Quantum Random Oracles
  • Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols. .