ProvSec 2018

From Openresearch
Jump to: navigation, search
ProvSec 2018
12th International Conference on Provable Security
Event in series ProvSec
Dates 2018/10/25 (iCal) - 2018/10/28
Homepage: https://ssl.informatics.uow.edu.au/provsec2018/index.html
Location
Location: Jeju Island, South Korea
Loading map...

Important dates
Papers: 2018/06/30
Submissions: 2018/06/30
Notification: 2018/08/30
Camera ready due: 2018/08/15
Registration link: https://ssl.informatics.uow.edu.au/provsec2018/reg.html
Accepted short papers: 4
Papers: Submitted 48 / Accepted 21 (43.8 %)
Committees
Organizers: Namje Park
General chairs: Ilsun You, Kyung Hyune Rhee
PC chairs: Willy Susilo, Joonsang Baek
Table of Contents


General information

Provable security is an essential tool for analyzing security of modern cryptographic primitives. The research community has witnessed the great contributions that the provable security methodology made to the analysis of cryptographic schemes and protocols. Nowadays cryptographic primitives without a rigorous "proof" cannot be regarded as sound. Also, the methodology has been used to discover security flaws in the cryptographic schemes and protocols, which were considered seemingly secure without formal analysis. On the one hand, provable security provides confidence in using cryptographic schemes and protocols for various real-world applications, but on the other hand, schemes with provable security are sometimes not efficient enough to be used in practice, and correctness of the proofs may be difficult to verify. Therefore, ProvSec conference is to provide a platform for researchers, scholars and practitioners to exchange new ideas on diverse problems in provable security.


Conference topics

All aspects of provable security in constructing and analyzing cryptographic primitives, including but are not limited to:

   - Provably secure asymmetric primitives
   - Provably secure symmetric primitives
   - Tightness of security reductions
   - Provable security in post-quantum cryptography
   - Privacy and anonymity technologies
   - Cryptographic protocol verifier
   - Theory and practice of game-hopping proof techniques
   - Secure hash functions
   - Provable security in the real-world security systems
   - Secure key management
   - Refinement of proof techniques
   - Provably Secure cryptographic protocols and applications
   - Security notions, approaches and paradigms
   - Steganography
   - Lightweight cryptography
   - Lattice-based cryptography


Publication of proceedings and papers

The conference proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science series (see www.springer.com/lncs). The best paper(s) and best student paper(s) will be selected and awarded a prize.


Special issues for this conference

Selected papers from ProvSec2018 will be published by IEICE Transactions on Information and Systems - Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications (pending acceptance of the proposal) and Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA).