ProvSec

 

          A Homomorphic Proxy Re-encryption From Lattices

       Chunguang Ma         (Harbin Engineering University, China)

       Juyan Li                (Harbin Engineering University, China)

       Weiping Ouyang        (Harbin Engineering University, China)

 

         Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation

       Gang Yu                (East China Normal University, China)

          Zhenfu Cao             (East China Normal University, China)

          Guang Zeng            (Zhengzhou Information Science and Technology Institute, China)

       Wenbao Han            (Zhengzhou Information Science and Technology Institute, China)

 

          Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction

       Kazuki Yoneyama      (Ibaraki University, Japan)

       Reo Yoshida            (NTT Secure Platform Laboratories, Japan)

       Yuto Kawahara         (NTT Secure Platform Laboratories, Japan)

       Tetsutaro Kobayashi    (NTT Secure Platform Laboratories, Japan)

       Hitoshi Fuji             (NTT Secure Platform Laboratories, Japan)

       Tomohide Yamamoto   (NTT Secure Platform Laboratories, Japan)

 

      Secure and Efficient Construction of Broadcast Encryption with Dealership

       Kamalesh Acharya     (Indian Institute of Technology Kharagpur, India)

       Ratna Dutta            (Indian Institute of Technology Kharagpur, India)

 

      One-round Attribute-based Key Exchange in the Multi-Party Setting

       Yangguang Tian        (University of Wollongong, Australia)

       Guomin Yang           (University of Wollongong, Australia)

       Yi Mu                   (University of Wollongong, Australia)

       Kaitai Liang             (Manchester Metropolitan University, UK)

       Yu Yong                (University of Electronic Science and Technology of China, China)

 

      An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures

       Hui Cui                 (Singapore Management University, Singapore)

       Robert H. Deng         (Singapore Management University, Singapore)

       Guowei Wu             (Singapore Management University, Singapore)

       Junzuo Lai              (Jinan University, China)

 

      A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress)

       Jun Gao                (Northeastern University, China)

       Jiaqi Wang             (Northeastern University, China)

       Ning Lu                (Northeastern University, China)

       Fang Zhu              (Northeastern University, China)

       Wenbo Shi             (Northeastern University, China)

 

      Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message

       Yong Xie               (WuHan University, China)

       Li-Bing Wu             (WuHan University, China)

       Yubo Zhang            (WuHan University, China)

       Zhiyan Xu              (WuHan University, China)

 

      Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme

       Zengpeng Li            (Harbin Engineering University, China)

       Steven Galbraith       (University of Auckland, New Zealand)

       Chunguang Ma         (Harbin Engineering University, China)

 

      Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update

      Yinhao Jiang           (University of Wollongong, Australia)

       Willy Susilo              (University of Wollongong, Australia)

       Yi Mu                   (University of Wollongong, Australia))

       Fuchun Guo             (University of Wollongong, Australia)

 

      ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure

       Jianhong Zhang        (North China University of Technology , China)

       Pengyan Li        (North China University of Technology , China)

       Zhibin Sun        (North China University of Technology , China)

Jian Mao                  (Beihang University, China)

 

      Efficient Dynamic Provable Data Possession from Dynamic Binary Tree

       Changfeng Li          (Nanjing University of Finance & Economics, China)

       Huaqun Wang         (Nanjing University of Posts and Telecommunications, China)

 

      Towards Certificate-Based Group Encryption 

       Yili Ren                (Beihang University, China)

       Xiling Luo              (Beihang University, China)

       Qianhong Wu          (Beihang University, China)

       Joseph Liu             (Monash University, Australia)

       Peng Zhang            (Shenzhen University, China)

 

      Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage

       Sujuan Li             (Nanjing Tech University, China)

       Yi Mu                 (University of Wollongong, Australia)

       Mingwu Zhang        (Hubei University of Technology, China)

       Futai Zhang          (Nanjing Normal University, China)

 

      Identity-Based Batch Provable Data Possession

       Zhou Fucai           (Northeastern University, China)

       Peng Su              (Northeastern University, China)

       Xu Jian               (Northeastern University, China)

       Xu Zifeng             (Northeastern University, China)

 

      Oblivious Keyword Search with Authorization

       Peng Jiang           (Beijing University of Posts and Telecommunications, Beijing)

       Xiaofen Wang        (University of Electronic Science and Technology of China, China)

       Jianchang Lai        (University of Wollongong, Australia)

         Fuchun Guo           (University of Wollongong, Australia)

       Rongmao Chen       (University of Wollongong, Australia)

 

      Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing

       Fucai Zhou          (Northeastern University, China)

       Yuxi Li               (Northeastern University, China)

         Alex X Liu             (Michigan State University, United States)

       Muqing Lin          (Northeastern University, China)

       Zifeng Xu           (Northeastern University, China)

 

      A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model

       Jianye Huang        (South China Agricultural University, China)

       Qiong Huang        (South China Agricultural University, China)

       Chunhua Pan        (South China Agricultural University, China)

 

      Efficient Asymmetric Index Encapsulation Scheme for Named Data

       Ma Rong             (Shanghai Jiaotong University, China)

       Zhenfu Cao          (East China Normal University, China)

 

      Integrity Analysis of Authenticated Encryption Based on Stream Ciphers

       Kazuya Imamura     (Nagoya University, Japan)

       Kazuhiko Minematsu (NEC Corporation, Japan)

       Tetsu Iwata          (Nagoya University, Japan)

 

      Universally Composable Cryptographic Role-Based Access Control

       Bin Liu               (University of Bristol, United Kingdom)

       Bogdan Warinschi    (University of Bristol, United Kingdom)

 

      Proofs of Ownership Beyond Bounded Leakage

       Yongjun Zhao        (The Chinese University of Hong Kong, Hong Kong)

         Sherman S. M. Chow    (The Chinese University of Hong Kong, Hong Kong)

 

      Secure Naive Bayesian Classification over Encrypted Data in Cloud

       Xingxin Li            (Nanjing University of Aeronautics and Astronautics, China)

         Youwen Zhu           (Nanjing University of Aeronautics and Astronautics, China)

       Jian Wang           (Nanjing University of Aeronautics and Astronautics, China)

 



2015-2016 All Rights Rreserved.