Skip to search formSkip to main contentSkip to account menu

Provable security

Known as: Provable, Provably secure, Security proof 
Provable security refers to any type or level of security that can be proved. It is used in different ways by different fields. Usually, this refers… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Advances in wireless communications, embedded systems, and integrated circuit technologies have enabled the wireless body area… 
Highly Cited
2012
Highly Cited
2012
Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we… 
Highly Cited
2008
Highly Cited
2008
Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of which have been extensively… 
Highly Cited
2007
Highly Cited
2007
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every… 
Highly Cited
2006
Highly Cited
2006
We give a provable-security treatment for the key-wrap problem, providing definitions, constructions, and proofs. We suggest that… 
Highly Cited
2005
Highly Cited
2005
AbstractWe give an informal analysis and critique of several typical "provable security" results. In some cases there are… 
Highly Cited
2001
Highly Cited
2001
A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data… 
Highly Cited
2000
Highly Cited
2000
A group signature scheme allows a group member to sign messages anonymously on behalf of the group. However, in the case of a… 
Highly Cited
1992
Highly Cited
1992
The purpose of this paper is to show that there exist DES-like iterated ciphers, which are provably resistant against… 
Highly Cited
1978
Highly Cited
1978
This paper suggests that input and output are basic primitives of programming and that parallel composition of communicating…