Provable Security

10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings

  • Liqun Chen
  • Jinguang Han
Conference proceedings ProvSec 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10005)

Also part of the Security and Cryptology book sub series (LNSC, volume 10005)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Attribute/Role-Based Cryptography

  3. Data in Cloud

    1. Front Matter
      Pages 81-81
    2. Jianhong Zhang, Pengyan Li, Zhibin Sun, Jian Mao
      Pages 83-100
    3. Fucai Zhou, Su Peng, Jian Xu, Zifeng Xu
      Pages 112-129
    4. Xingxin Li, Youwen Zhu, Jian Wang
      Pages 130-150
  4. Searchable Encryption

    1. Front Matter
      Pages 151-151
    2. Fucai Zhou, Yuxi Li, Alex X. Liu, Muqing Lin, Zifeng Xu
      Pages 153-172
    3. Peng Jiang, Xiaofen Wang, Jianchang Lai, Fuchun Guo, Rongmao Chen
      Pages 173-190
  5. Key Management

    1. Front Matter
      Pages 205-205
    2. Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto
      Pages 207-226
    3. Yangguang Tian, Guomin Yang, Yi Mu, Kaitai Liang, Yong Yu
      Pages 227-243
    4. Yong Xie, Libing Wu, Yubo Zhang, Zhiyan Xu
      Pages 244-254
  6. Encryption

    1. Front Matter
      Pages 255-255
    2. Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata
      Pages 257-276
    3. Yili Ren, Xiling Luo, Qianhong Wu, Joseph K. Liu, Peng Zhang
      Pages 296-305
  7. Leakage Analysis

    1. Front Matter
      Pages 307-307
    2. Sujuan Li, Yi Mu, Mingwu Zhang, Futai Zhang
      Pages 309-319
    3. Yongjun Zhao, Sherman S. M. Chow
      Pages 340-350
  8. Homomorphic Encryption

    1. Front Matter
      Pages 351-351
    2. Chunguang Ma, Juyan Li, Weiping Ouyang
      Pages 353-372
    3. Zengpeng Li, Steven D. Galbraith, Chunguang Ma
      Pages 373-383
  9. Back Matter
    Pages 393-394

About these proceedings


This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016.
The 17 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions. The papers are grouped in topical sections on attribute/role-based cryptography, data in cloud, searchable encryption, key management, encryption, leakage analysis, homomorphic encryption.


authentication batch proving cloud cryptography digital signature security protocols access control anonymity and untraceability block and stream ciphers cloud security cryptanalysis and other attacks data privacy formal security models hash functions key management message authentication codes privacy protections pseudonymity public key encryption side-channel analysis and countermeasures trusted computing

Editors and affiliations

  • Liqun Chen
    • 1
  • Jinguang Han
    • 2
  1. 1.University of Surrey GuildfordUnited Kingdom
  2. 2.Nanjing University of Finance and EconomicsNanjingChina

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing AG 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-47421-2
  • Online ISBN 978-3-319-47422-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software
Consumer Packaged Goods