posted by user: jkawamoto || 2972 views || tracked by 8 users: [display]

ProvSec 2014 : The Eighth International Conference on Provable Security


Conference Series : Provable Security
When Oct 9, 2014 - Oct 10, 2014
Where Hong Kong
Submission Deadline Jun 20, 2014
Notification Due Jul 23, 2014
Final Version Due Aug 12, 2014
Categories    security

Call For Papers

The Eighth International Conference on Provable Security (ProvSec 2014) will be held in Hong Kong on 9-10
October 2014. It will be organized by University of Hong Kong.
Provable security is an important research area in modern cryptography. Cryptographic primitives or protocols
without a rigorous proof cannot be regarded as secure in practice. In fact, there are many schemes that were originally
thought as secure but eventually broken, which clearly indicates the need of formal security assurance. With provable
security, we are confident in using cryptographic schemes and protocols in various real-world applications.
Meanwhile, schemes with provable security sometimes give only theoretical feasibility rather than a practical
construction, and correctness of the proofs may be difficult to verify. ProvSec conference thus provides a platform for
researchers, scholars and practitioners to exchange new ideas for solving these problems in the provable security area.
The previous ProvSec conference series were successfully held in Wollongong, Australia (2007), Shanghai, China
(2008), Guangzhou, China (2009), Malacca, Malaysia (2010), Xi’an, China (2011), Chengdu, China (2012) and
Malacca, Malaysia (2013). The conference proceedings will be published by Springer-Verlag in the Lecture Notes in
Computer Science series.
Conference Topics: All aspects of provable security for cryptographic primitives or protocols, include but are not
limited to the following areas:
• Asymmetric provably secure cryptography
• Cryptographic primitives
• Lattice-based security reductions
• Leakage-resilient cryptography
• Pairing-based provably secure cryptography
• Privacy and anonymity technologies
• Provable secure block ciphers and hash functions
• Secure cryptographic protocols and applications
• Security notions, approaches, and paradigms
• Steganography and steganalysis

Special issues:
Journal: Security and Communication Networks (SCN)
Topic: Special Issue on “Provably Secure Cryptographic Solutions for Wireless Networks”

We are further discussing with other journals for special issues of selected papers published in ProvSec (after
significant extension). More details will be announced later.
Important Dates:
Conference date: 9-10 October 2014
Paper submission deadline: 20 June 2014
Notification of acceptance: 23 July 2014
Proceedings version deadline: 12 August 2014

Conference Organization:
General Co-Chairs:
Lucas C.K. Hui (University of Hong Kong, Hong Kong)
S.M. Yiu (University of Hong Kong, Hong Kong)
Program Co-Chairs:
Sherman S. M. Chow (Chinese University of Hong Kong, Hong Kong)
Joseph K. Liu (Institute for Infocomm Research, Singapore)
Program Committee:
Elena Andreeva (KU Leuven, Belgium)
Man-Ho Au (University of Wollongong, Australia)
Reza Azarderakhsh (Rochester Institute of Technology, US)
Joonsang Baek (Khalifa University of Science Technology and Research, UAE)
Paulo S. L. M. Barreto (University of São Paulo, Brazil)
Olivier Blazy (RUHR, Germany)
Andrej Bogdanov (Chinese University of Hong Kong, Hong Kong)
Sanjit Chatterjee (IISC, India)
Liqun Chen (HP Labs, UK)
Seung Geoi Choi (United States Naval Academy, US)
Georg Fuchsbauer (IST, Austria)
David Galindo (LORIA-CNRS, France)
Sanjam Garg (IBM Research, US)
Matthew Henricksen (Institute for Infocomm Research, Singapore)
Xinyi Huang (Fujian Normal University, China)
Stanislaw Jarecki (University of California at Irvine, US)
Miroslaw Kutylowski (Wroclaw University of Technology, Poland
Jin Li (Guangzhou University, China)
Shengli Liu (Shanghai Jiao Tong University, China)
Mark Manulis (University of Surrey, UK)
Sarah Meiklejohn (University of Calirofrnia at San Diego, US)
Kazuhiko Minematsu (NEC, Japan)
Atsuko Miyaji (JAIST, Japan)
Alptekin Küpçü (Koç University, Turkey)
Reza Reyhanitabar (EPFL, Switzerland)
Reihaneh Safavi-Naini (University of Calgary, Canada)
Alice Silverberg (University of California at Irvine, US)
Willy Susilo (University of Wollongong, Australia)
Koutarou Suzuki (NTT, Japan)
Tsuyoshi Takagi (Kyushu University, Japan)
Berkant Ustaoğlu (İzmir Institute of Technology)
Cong Wang (City University of Hong Kong, Hong Kong)
Duncan Wong (City University of Hong Kong, Hong Kong)
Wun-She Yap (Universiti Tunku Abdul Rahman, Malaysia)
Zongyang Zhang (AIST, Japan)

Related Resources

IJISS 2016   International Journal of Information Security Science (IJISS)
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems
SMGSSP 2017   Smart Micro-Grid Systems Security and Privacy