Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Provable security

Known as: Provable, Provably secure, Security proof 
Provable security refers to any type or level of security that can be proved. It is used in different ways by different fields. Usually, this refers… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE) under concrete and noninteractive… Expand
  • table 1
Highly Cited
2009
Highly Cited
2009
Password authentication has been adopted as one of the most commonly used solutions in network environment to protect resources… Expand
Highly Cited
2008
Highly Cited
2008
Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of which have been extensively… Expand
  • figure 1
Highly Cited
2007
Highly Cited
2007
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2006
Highly Cited
2006
We give a provable-security treatment for the key-wrap problem, providing definitions, constructions, and proofs. We suggest that… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2005
Highly Cited
2005
AbstractWe give an informal analysis and critique of several typical "provable security" results. In some cases there are… Expand
  • figure 1
Highly Cited
2001
Highly Cited
2001
A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 5
Highly Cited
2000
Highly Cited
2000
A group signature scheme allows a group member to sign messages anonymously on behalf of the group. However, in the case of a… Expand
Highly Cited
1992
Highly Cited
1992
This paper presents a three-move interactive identification scheme and proves it to be as secure as the discrete logarithm… Expand
Highly Cited
1978
Highly Cited
1978
This paper suggests that input and output are basic primitives of programming and that parallel composition of communicating… Expand
  • figure 2