ProvSec: Provable Security

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2016 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
ProvSec 2015 The 9th International Conference on Provable Security
Nov 24, 2014 - Nov 26, 2014 Kanazawa, Japan Jul 4, 2014
ProvSec 2014 The Eighth International Conference on Provable Security
Oct 9, 2014 - Oct 10, 2014 Hong Kong Jun 20, 2014
ProvSec 2013 The Seventh International Conference on Provable Security (ProvSec 2013)
Oct 23, 2013 - Oct 25, 2013 Melaka, Malaysia May 23, 2013
ProvSec 2011 Conference on Provable Security
Aug 16, 2011 - Aug 18, 2011 Xi'an, China May 1, 2011
 
 

Present CFP : 2015

The Ninth International Conference on Provable Security (ProvSec 2015)

November 24-26, 2015
Kanazawa, Japan
Web Page: https://security-lab.jaist.ac.jp/provsec2015/
Contact: provsec2015-info@aqua.jaist.ac.jp

________________________________________
The Ninth International Conference on Provable Security (ProvSec 2015) will be held in Kanazawa, Japan on November 2015. It will be organized by Japan Advanced Institute of Science and Technology (JAIST).
Provable security is an important research area in modern cryptography. Cryptographic primitives or protocols without a rigorous proof cannot be regarded as secure in practice. In fact, there are many schemes that were originally thought as secure but eventually broken, which clearly indicates the need of formal security assurance. With provable security, we are confident in using cryptographic schemes and protocols in various real-world applications. Meanwhile, schemes with provable security sometimes give only theoretical feasibility rather than a practical construction, and correctness of the proofs may be difficult to verify. ProvSec conference thus provides a platform for researchers, scholars and practitioners to exchange new ideas for solving these problems in the provable security area.
The previous ProvSec conference series were successfully held in Wollongong, Australia (2007), Shanghai, China (2008), Guangzhou, China (2009), Malacca, Malaysia (2010), Xi’an, China (2011), Chengdu, China (2012), Malacca, Malaysia (2013) and Hong Kong, China (2014). The conference proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science series, and we are discussing with journals for special issues of selected papers published in ProvSec (after significant extension). More details will be announced later.

Conference Topics:
All aspects of provable security for cryptographic primitives or protocols, include but are not limited to the following areas:
•Asymmetric provably secure cryptography
•Cryptographic primitives
•Lattice-based security reductions
•Leakage-resilient cryptography
•Pairing-based provably secure cryptography
•Privacy and anonymity technologies
•Provable secure block ciphers and hash functions
•Secure cryptographic protocols and applications
•Security notions, approaches, and paradigms
•Steganography and steganalysis


Important Dates:
Conference date: November 24-26, 2015
Submission deadline: Extended to July 4, 2015 at 23:59 (JST) (Firm)
Notification: August 24, 2015
Camera ready deadline: August 31, 2015


Instructions for Authors:
Submissions must not substantially duplicate work that any of the authors have published elsewhere or that have been submitted in parallel with any other conference or workshop. Submissions should be anonymous, with no author names, affiliations, acknowledgement or obvious references. More details will be published soon. At least one author of each accepted paper must register with the conference and present the paper.


Stipend:
The ProvSec 2015 student grant program provides a limited number of stipends to help partially cover travel and accommodation expenses for full-time students whose paper is accepted and present the paper at ProvSec 2015. More information about stipends, including instructions about how to apply, will appear on the web page.


Invited Lectures (tentative)
Sanjam Garg (University of California, Berkeley):
Garbled Random-Access Machines.
Phillip Rogaway (University of California, Davis):
Advances in Authenticated Encryption.
Serge Vaudenay (EPFL):
On Privacy for RFID.


Conference Venue:
Kanazawa is the prefectural capital of Ishikawa Prefecture and located in the central part of the mainland of Japan. It takes 45 min by airplane and 2 hours 28 min by bullet train from Tokyo. In Kanazawa, there are one of Japan's three most beautiful gardens called Kenrokuen, and Kanazawa Castle. For more information, visit http://www.kanazawa-tourism.com/.


Conference Organization:

General Chair:
Tatsuaki Okamoto (NTT, Japan)

Program Co-Chairs:
Man-Ho Au (The Hong Kong Polytechnic University, Hong Kong)
Atsuko Miyaji (JAIST, Japan)

Steering Committee:
Feng Bao (Huawei, Singapore)
Xavier Boyen (Queensland University of Technology, Australia)
Yi Mu (University of Wollongong, Australia)
Josef Pieprzyk (Queensland University of Technology, Australia)
Willy Susilo (University of Wollongong, Australia)

Program Committee:
Michel Abdalla (Ecole Normale Superieure, France)
Elena Andreeva (KU Leuven, Belgium)
Joonsang Baek (Khalifa University of Science Technology and Research, UAE)
Olivier Blazy (Université de Limoges, France)
Carlo Blundo (University of Salerno, Italy)
Colin Boyd (Norwegian University of Science and Technology, Norway)
Mike Burmester (FSU, US)
Liqun Chen (HP Labs, UK)
Chen-Mou Cheng (Kyushu University, Japan)
Céline Chevalier (Université Panthéon-Assas, France)
Yvo Desmedt (University of Texas at Dallas, US, and UCL, UK)
Alexandre Duc (École polytechnique fédérale de Lausanne EPFL, Switzerland)
Eiichiro Fujisaki (NTT, Japan)
David Galindo (Scytl Secure Electronic Voting, Spain)
Swee-Huay Heng (Multimedia University, Malaysia)
Xinyi Huang (Fujian Normal University, China)
Aniket Kate (Sarrland University, Germany)
Kwangjo Kim (KAIST, Korea)
Mirosław Kutyłowski (Wrocław University of Technology, Poland)
Alptekin Küpçü (Koç University, Turkey)
Joseph K.Liu (Monash University, Australia)
Subhamoy Maitra (Indian Statistical Institute, India)
Mark Manulis (University of Surrey, UK)
Mitsuru Matsui (Mitsubishi Electric Corporation, Japan)
Ali Miri (Ryerson University, Canada)
Tarik Moataz (Colorado State University, US)
Jong Hwan Park (Sangmyung University, Korea)
Josef Pieprzyk (Queensland University of Technology, Australia)
Willy Susilo (University of Wollongong, Australia)
Mehdi Tibouchi (NTT, Japan)
Damien Vergnaud (Écolenormale supérieure, France)
Cong Wang (City University of Hong Kong, Hong Kong)
Shouhuai Xu (University of Texas at San Antonio, US)
Bo-Yin Yang (Academia Sinica, Taiwan)
Fangguo Zhang (Sun Yat-sen University, China)

Organizing Committee:
Kazumasa Omote (JAIST, Japan)
Shoichi Hirose (University of Fukui, Japan)
Yuji Suga (IIJ, Japan)
Kenji Yasunaga (Kanazawa University, Japan)
Jiageng Chen (JAIST, Japan)
Takato Hirano (Mitsubishi Electric, Japan)
Masaki Fujikawa (ALSOK, Japan)
Yuichi Futa (JAIST, Japan)
Takeshi Chikazawa (IPA, Japan)
Ryo Kikuchi (NTT, Japan)
Tsuyoshi Takagi (Kyushu University, Japan)
Naoto Yanai (Osaka University, Japan)
Toru Nakamura (KDDI Labs, Japan)
Toru Nakanishi (Hiroshima University, Japan)
SeongHan Shin (AIST, Japan)
Atsuo Inomata (NAIST, Japan)
Akira Kanaoka (Toho University, Japan)
Toshihiro Yamauchi (Okayama University, Japan)
Masaaki Shirase (Future University Hakodate, Japan)
Hideyuki Miyake (Toshiba, Japan)
Dai Watanabe (Hitachi, Japan)
Chunhua Su (JAIST, Japan)
Isao Echizen (NII, Japan)
Keita Emura (NICT, Japan)
Satoru Tanaka (JAIST, Japan)
 

Related Resources

ACISP 2017   Australasian Conference on Information Security and Privacy
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
ACNS 2017   The 15th International Conference on Applied Cryptography and Network Security
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
IJISS 2016   International Journal of Information Security Science (IJISS)
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
SOUPS 2017   Symposium on Usable Privacy and Security
ICISE 2017   2017 2nd International Conference on Information Systems Engineering (ICISE 2017)--IEEE, Ei Compendex and Scopus
BDCloud 2017   The 7th IEEE International Conference on Big Data and Cloud Computing