The 12th International Conference on Provable Security
25-28 October, 2018, Jeju, Rep. of Korea

List of Accepted Papers

Full Papers
1. A code-based linkable ring signature scheme
Pedro Branco and Paulo Mateus
2. On the Leakage of Corrupted Garbled Circuits
Aurélien Dupin, David Pointcheval and Christophe Bidan
3. Location-Proof System based on Secure Multi-Party Computations
Aurélien Dupin, Jean-Marc Robert and Christophe Bidan
4. Digital Signatures from the Middle-Product LWE
Ryo Hiromasa
5. Modeling Privacy in WiFi Fingerprinting Indoor Localization
Zheng Yang and Kimmo Järvinen
6. Verifiable Homomorphic Secret Sharing
Georgia Tsaloli, Bei Liang and Aikaterini Mitrokotsa
7. Single Private-Key Generator Security Implies Multiple Private-Key Generators Security
Atsushi Fujioka and Kazuki Yoneyama
8. Secure Outsourcing of Cryptographic Circuits Manufacturing
Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis and Daniele Venturi
9. Multivariate encryption schemes based on the constrained MQ problem
Takanori Yasuda
10. A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme
Varshika Srinivasavaradhan, Arinjita Paul, Dr. Sharmila Deva Selvi S and Chandrasekaran Pandurangan
11. Token-Based Multi-Input Functional Encryption
Nuttapong Attrapadung, Goichiro Hanaoka, Takato Hirano, Yutaka Kawai, Yoshihiro Koseki and Jacob C. N. Schuldt
12. On the CCA2 Security of McEliece in the Standard Model
Edoardo Persichetti
13. Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation
David Derler, Sebastian Ramacher and Daniel Slamanig
14. On the Hardness of Learning Parity with Noise over Rings
Shuoyao Zhao, Yu Yu and Jiang Zhang
15. Efficient Attribute-Based Encryption with BlackBox Traceability
Shengmin Xu, Guomin Yang and Yi Mu
16. Security notions for cloud storage and deduplication
Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum and Mohsen Toorani
17. Length-Preserving Encryption Based on Single-key Tweakable Block Cipher
Xiangyang Zhang, Yaobin Shen, Hailun Yan, Ying Zou, Ming Wan, Zheyi Wu and Lei Wang
18. Forward Secrecy for SPAKE2
Jose Becerra, Dimiter Ostrev and Marjan Skrobot
19. Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DejaQ and Dual-Form Signature
Sanjit Chatterjee and R Kabaleeshwaran
20. Simpler Identity-Based Ring Signatures from Lattices
Gongming Zhao and Miaomiao Tian
21. A Generic Construction of Sequential Aggregate MACs from Any MACs
Shingo Sato, Shoichi Hirose and Junji Shikata

Short Papers
1. User-Mediated Authentication Protocols and Unforgeability for Key Collision
Britta Hale
2. Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols
Satoshi Yasuda, Yoshihiro Koseki, Yusuke Sakai, Fuyuki Kitagawa, Yutaka Kawai and Goichiro Hanaoka
3. BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing
Leon J. Helsloot, Gamze Tillem and Zekeriya Erkin
4. Signcryption with Quantum Random Oracles
Shingo Sato and Junji Shikata