Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Provable security

Known as: Provable, Provably secure, Security proof 
Provable security refers to any type or level of security that can be proved. It is used in different ways by different fields. Usually, this refers… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Parameter control is aimed at realizing performance gains through a dynamic choice of the parameters which determine the behavior… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
Review
2017
Review
2017
This paper surveys quantum learning theory: the theoretical aspects of machine learning using quantum computers. We describe the… Expand
Is this relevant?
Highly Cited
2011
Highly Cited
2011
  • B. Waters
  • Public Key Cryptography
  • 2011
  • Corpus ID: 2053208
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE) under concrete and noninteractive… Expand
  • table 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Password authentication has been adopted as one of the most commonly used solutions in network environment to protect resources… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of which have been extensively… Expand
  • figure 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We give a provable-security treatment for the key-wrap problem, providing definitions, constructions, and proofs. We suggest that… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2001
Highly Cited
2001
A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
A group signature scheme allows a group member to sign messages anonymously on behalf of the group. However, in the case of a… Expand
Is this relevant?
Highly Cited
1992
Highly Cited
1992
This paper presents a three-move interactive identification scheme and proves it to be as secure as the discrete logarithm… Expand
Is this relevant?
Highly Cited
1978
Highly Cited
1978
This paper suggests that input and output are basic primitives of programming and that parallel composition of communicating… Expand
  • figure 2
Is this relevant?