Provable Security

5th International Conference, ProvSec 2011, Xi’an, China, October 16-18, 2011. Proceedings

  • Xavier Boyen
  • Xiaofeng Chen
Conference proceedings ProvSec 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6980)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Cryptographic Primitives

    1. Paolo Palmieri, Olivier Pereira
      Pages 3-15
    2. Ning Ding, Dawu Gu
      Pages 16-33
    3. Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga
      Pages 34-51
  4. Encryption

    1. Gilles Barthe, Federico Olmedo, Santiago Zanella Béguelin
      Pages 68-83
    2. Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer
      Pages 102-119
    3. Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi
      Pages 120-137
    4. Yoshikazu Hanatani, Hirofumi Muratani, Tomoko Yonemura
      Pages 138-153
    5. Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi
      Pages 154-169
  5. Cryptographic Protocols

    1. Tsz Hon Yuen, Duncan S. Wong, Willy Susilo, Qiong Huang
      Pages 170-187
    2. Rong Cheng, Bo Zhang, Fangguo Zhang
      Pages 188-203
    3. Duong Hieu Phan, Viet Cuong Trinh
      Pages 204-221
    4. Rafael Tonicelli, Bernardo Machado David, Vinícius de Morais Alves
      Pages 222-239
    5. Shengli Liu, Junzuo Lai, Robert H. Deng
      Pages 257-265
  6. Security Models and Framework

    1. Liting Zhang, Wenling Wu, Peng Wang
      Pages 266-280
    2. Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta
      Pages 281-296
    3. Hitoshi Namiki, Keisuke Tanaka, Kenji Yasunaga
      Pages 309-323
    4. Gilbert Baumslag, Nelly Fazio, Antonio R. Nicolosi, Vladimir Shpilrain, William E. Skeith III
      Pages 324-339
    5. Kristian Gjøsteen, George Petrides, Asgeir Steine
      Pages 340-347
  7. Key Agreement

  8. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 5th Provable Security Conference held in in Xi'an, China, in October 2011. The 22 full papers presented together with 4 short papers and 2 invited talks were carefully reviewed and selected from 75 submissions. The papers are divided in topical sections on cryptographic primitives; encryption; cryptographic protocols; security models and framework; and key agreement.


authentication broadcast encryption digital signatures oblivious transfer zero-knowledge

Editors and affiliations

  • Xavier Boyen
    • 1
  • Xiaofeng Chen
    • 2
  1. 1.Palo Alto Research CenterPalo AltoUSA
  2. 2.School of Telecommunications EngineeringXidian UniversityXi’anChina

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-24315-8
  • Online ISBN 978-3-642-24316-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site