Journal: Security and Communication Networks

Volume 9, Issue 12

1635 -- 1637Shaoquan Jiang, Tsuyoshi Takagi, Guilin Wang. Special issue on provable security
1638 -- 1649Mingwu Zhang, Bo Yang 0003. Continual key leakage tolerant encryption from extensible set delegation
1650 -- 1662Sree Vivek Sivanandam, S. Sharmila Deva Selvi, Akshayaram Srinivasan, Chandrasekaran Pandu Rangan. Stronger public key encryption system withstanding RAM scraper like attacks
1663 -- 1675Yutaka Kawai, Goichiro Hanaoka, Kazuo Ohta, Noboru Kunihiro. A limitation on security evaluation of cryptographic primitives with fixed keys
1676 -- 1697Yoshikazu Hanatani, Goichiro Hanaoka, Takahiro Matsuda 0002, Takashi Yamakawa. Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models
1698 -- 1716Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao. Generalized (identity-based) hash proof system and its applications
1717 -- 1725Takanori Suga, Takashi Nishide, Kouichi Sakurai. Character-based symmetric searchable encryption and its implementation and experiment on mobile devices
1726 -- 1736Yoshinao Uchide, Noboru Kunihiro. Searchable symmetric encryption capable of searching for an arbitrary string
1737 -- 1747Mingwu Zhang, Yi Mu, Jian Shen, Xinyi Huang. Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity
1748 -- 1758Suqing Lin, Rui Zhang 0002, Mingsheng Wang. Verifiable attribute-based proxy re-encryption for secure public cloud data sharing
1759 -- 1768Mohsen Alimomeni, Reihaneh Safavi-Naini. Two-level security for message sequences
1769 -- 1785David Nuñez, Isaac Agudo, Javier Lopez. On the application of generic CCA-secure transformations to proxy re-encryption
1786 -- 1795Satsuya Ohata, Kanta Matsuura. Proxy re-encryption via indistinguishability obfuscation
1796 -- 1809Dennis Y. W. Liu, Duncan S. Wong. One-move convertible nominative signature in the standard model
1810 -- 1819Shengke Zeng, Qinyi Li, Zhiguang Qin, Qing Lu. Non-interactive deniable ring signature without random oracles
1820 -- 1828Haibo Tian, Fangguo Zhang, Baodian Wei. A lattice-based partially blind signature
1829 -- 1842Yuyu Wang, Keisuke Tanaka. Generic transformations for existentially unforgeable signature schemes in the bounded leakage model
1843 -- 1863Yanfei Guo, Zhenfeng Zhang. Authenticated key exchange with entities from different settings and varied groups
1864 -- 1871Teng Wu, Guang Gong. Two new message authentication codes based on APN functions and stream ciphers