Provable Security

11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings

  • Tatsuaki Okamoto
  • Yong Yu
  • Man Ho Au
  • Yannan Li
Conference proceedings ProvSec 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10592)

Also part of the Security and Cryptology book sub series (LNSC, volume 10592)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Secure Cloud Storage and Computing

    1. Front Matter
      Pages 1-1
    2. Zhi Liang, Qianhong Wu, Weiran Liu, Jianwei Liu, Fu Xiao
      Pages 3-23
    3. Yunling Wang, Jianfeng Wang, Shi-Feng Sun, Joseph K. Liu, Willy Susilo, Xiaofeng Chen
      Pages 24-38
    4. Ru Meng, Yanwei Zhou, Jianting Ning, Kaitai Liang, Jinguang Han, Willy Susilo
      Pages 39-56
    5. Yang Liu, Xingxin Li, Youwen Zhu, Jian Wang, Zhe Liu
      Pages 57-73
    6. Junzuo Lai, Jie Xiong, Chuansheng Wang, Guangzheng Wu, Yanling Li
      Pages 74-83
  3. Digital Signature and Authentication

    1. Front Matter
      Pages 85-85
    2. Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Dominik Hartmann
      Pages 87-106
    3. Zhen Wang, Xiling Luo, Qianhong Wu
      Pages 107-126
    4. Shengke Zeng, Yi Mu, Guomin Yang, Mingxing He
      Pages 127-143
  4. Authenticated Encryption and Key Exchange

    1. Front Matter
      Pages 145-145
    2. Ping Zhang, Peng Wang, Honggang Hu, Changsong Cheng, Wenke Kuai
      Pages 147-166
    3. Suvradip Chakraborty, Janaka Alawatugoda, C. Pandu Rangan
      Pages 167-187
  5. Security Models

    1. Front Matter
      Pages 199-199
    2. Yuan Chen, Qingkuan Dong, Qiqi Lai
      Pages 236-250
    3. Ahto Buldas, Matthias Geihs, Johannes Buchmann
      Pages 251-260

About these proceedings


This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 76 submissions. The papers are grouped in topical sections on secure cloud storage and computing; digital signature and authentication; authenticated encryption and key exchange; security models; lattice and post-quantum cryptography; public key encryption and signcryption; proxy re-encryption and functional encryption; protocols.



Cryptography Key management Digital signatures Public key encryption Block and stream ciphers Hash functions and message authentication codes Cryptanalysis and other attacks Information-theoretic techniques Mathematical foundations of cryptography

Editors and affiliations

  1. 1.NTT LaboratoriesTokyoJapan
  2. 2.Shaanxi Normal UniversityXi’anChina
  3. 3.Hong Kong Polytechnic UniversityHong KongChina
  4. 4.University of WollongongWollongongAustralia

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-68636-3
  • Online ISBN 978-3-319-68637-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site