Search
Search Results
-
Provable and Practical Security 17th International Conference, ProvSec 2023, Wuhan, China, October 20–22, 2023, Proceedings
This volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023,...
-
Provable and Practical Security 16th International Conference, ProvSec 2022, Nan**g, China, November 11–12, 2022, Proceedings
This book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nan**g, China, in... -
Provable secure authentication key agreement for wireless body area networks
Wireless body area networks (WBANs) guarantee timely data processing and secure information preservation within the range of the wireless access...
-
Farasha: A Provable Permutation-Based Parallelizable PRF
The pseudorandom function Farfalle, proposed by Bertoni et al. at ToSC 2017, is a permutation based arbitrary length input and output PRF. At its... -
A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid
With the gradual maturity of Smart Grid (SG), security challenges become the most important issues that need to be addressed urgently. In recent...
-
A collusion-resistant certificateless provable data possession scheme for shared data with user revocation
Cloud storage service can provide a lot convenience for users to collect, store and share data within a group. However, there are some secure issues,...
-
Provable Security of \(\textrm{HADES}\) Structure
The \(\textrm{HADES}\) design strategy combines... -
Limits in the Provable Security of ECDSA Signatures
Digital Signatures are ubiquitous in modern computing. One of the most widely used digital signature schemes is... -
New Limits of Provable Security and Applications to ElGamal Encryption
We provide new results showing that ElGamal encryption cannot be proven CCA1-secure – a long-standing open problem in cryptography. Our result... -
Provable Data Possession (PDP) and Proofs of Retrievability (POR) of Current Big User Data
A growing trend over the last few years is storage outsourcing, where the concept of third-party data warehousing has become more popular. This trend...
-
Provable and Practical Security 15th International Conference, ProvSec 2021, Guangzhou, China, November 5–8, 2021, Proceedings
This book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in...
-
Provable Security Analysis of FIDO2
We carry out the first provable security analysis of the new FIDO2 protocols, the promising FIDO Alliance’s proposal for a standard for passwordless... -
Improved Provable Reduction of NTRU and Hypercubic Lattices
Lattice-based cryptography typically uses lattices with special properties to improve efficiency. We show how blockwise reduction can exploit... -
Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing
In recent days, cloud computing is a universal computing and conventional paradigm, in which the resources are provided over the Internet based on...
-
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle
We study the provable security claims of two NIST Lightweight Cryptography (LwC) finalists, GIFT-COFB and Photon-Beetle, and present several attacks... -
Cryptanalysis of Short and Provable Secure Lattice-Based Signature Scheme
Fenghe and Zhenhua proposed a short and provable secure lattice-based signature scheme in the standard model in 2016. Their aim was to construct a... -
Provable user authentication scheme on ECC in multi-server environment
Authentic communication is an inevitable trend in the fourth industrial revolution. In a city, the convenient administrative formalities should be...
-
What, Indeed, is an Achievable Provable Guarantee for Learning-Enabled Safety-Critical Systems
Machine learning has made remarkable advancements, but confidently utilising learning-enabled components in safety-critical domains still poses... -
Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability
Cloud computing provides outsourcing of computing services at a lower cost, making it a popular choice for many businesses. In recent years, cloud...
-
Privacy Protection Multi-copy Provable Data Possession Supporting Data Reliability
With the development of technology, a massive amount of data continues to emerge, and there is still a strong demand for data storage. Outsourcing...