default search action
ProvSec 2022: Nanjing, China
- Chunpeng Ge, Fuchun Guo:
Provable and Practical Security - 16th International Conference, ProvSec 2022, Nanjing, China, November 11-12, 2022, Proceedings. Lecture Notes in Computer Science 13600, Springer 2022, ISBN 978-3-031-20916-1
Encryption
- Kyoichi Asano, Keita Emura, Atsushi Takayasu, Yohei Watanabe:
A Generic Construction of CCA-Secure Attribute-Based Encryption with Equality Test. 3-19 - Pan Yang, Hongbo Li, Jianye Huang, Hao Zhang, Man Ho Au, Qiong Huang:
Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search. 20-35 - Geng Wang, Ming Wan, Dawu Gu:
More Efficient Verifiable Functional Encryption. 36-51 - Marcel Armour, Elizabeth A. Quaglia:
Subverting Deniability. 52-59 - Jodie Knapp, Elizabeth A. Quaglia:
Epoch Confidentiality in Updatable Encryption. 60-67
Lattice Based Cryptography
- Yanhua Zhang, Ximeng Liu, Yupu Hu:
Simplified Server-Aided Revocable Identity-Based Encryption from Lattices. 71-87 - Yuntao Wang, Yasuhiko Ikematsu, Takanori Yasuda:
Lattice-Based Public Key Cryptosystems Invoking Linear Mapping Mask. 88-104 - Yuting Jiang, Jianghong Wei, Jing Pan:
Batched Fully Dynamic Multi-key FHE from FHEW-Like Cryptosystems. 105-120 - Priyanka Dutta, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices. 121-136
Information Security
- Jian Huang, Shanliang Xue, Caiyi Wang:
Fast Out-of-Band Data Integrity Monitor to Mitigate Memory Corruption Attacks. 139-155 - Ge Zhang, Yu Geng, Xueman Kong, Yifa Li:
Construction of a New UAV Management System Based on UMIA Technology. 156-166 - Zhaobo Lu, Yilei Wang, Qingzhe Lv, Minghao Zhao, Tiancai Liang:
FP2-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning. 167-175 - Yu Li, Junzuo Lai, Xiaowei Yuan, Beibei Song:
Practical Federated Learning for Samples with Different IDs. 176-195
Blockchain
- Zhaojie Wang, Willy Susilo, Jianan Guo, Yilei Wang, Minghao Zhao:
Reinforcement-Mining: Protecting Reward in Selfish Mining. 199-209 - Wei-Yang Chiu, Weizhi Meng, Wenjuan Li, Liming Fang:
FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS Attacks. 210-227 - Juzheng Huang, Qiang Tang, Chunhua Su, Na Ruan:
Secure Collaboration Between Consortiums in Permissioned Blockchains. 228-245
Foundations
- Carsten Baum, Bernardo David, Rafael Dowsley:
(Public) Verifiability for Composable Protocols Without Adaptivity or Zero-Knowledge. 249-272 - Anit Kumar Ghosal, Satrajit Ghosh, Dipanwita Roychowdhury:
Practical Non-malleable Codes from Symmetric-Key Primitives in 2-Split-State Model. 273-281 - Bin Liu, Antonis Michalas, Bogdan Warinschi:
Cryptographic Role-Based Access Control, Reconsidered. 282-289
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.