Provable security

Known as: Provable, Provably secure, Security proof 
Provable security refers to any type or level of security that can be proved. It is used in different ways by different fields. Usually, this refers… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
The structure from motion (SfM) problem in computer vision is the problem of recovering the 3D structure of a stationary scene… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of which have been extensively… (More)
  • figure 1
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We consider the problem of efficiently proving the integrity of data stored at untrusted servers. In the provable data possession… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE) under concrete and noninteractive… (More)
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We give an informal analysis and critique of several typical "provable security" results. In some cases there are intuitive but… (More)
  • figure 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Since the appearance of public-key cryptography in the seminal Diffie—Hellman paper, many new schemes have been proposed and many… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Abst rac t . We introduce a methodology for designing block ciphers with provable security against differential and linear… (More)
  • figure 5
  • figure 7
Is this relevant?
Highly Cited
1995
Highly Cited
1995
The purpose of this paper is to show that DES-like iterated ciphers that are provably resistant against differential attacks… (More)
Is this relevant?
Highly Cited
1992
Highly Cited
1992
The purpose of this paper is to show that there exist DES-like iterated ciphers, which are provably resistant against… (More)
Is this relevant?