


default search action
ProvSec 2021: Guangzhou, China
- Qiong Huang, Yu Yu:

Provable and Practical Security - 15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021, Proceedings. Lecture Notes in Computer Science 13059, Springer 2021, ISBN 978-3-030-90401-2
Searchable Encryption
- Zhongming Wang

, Biwen Chen
, Tao Xiang
, Lu Zhou, Yan-Hong Liu, Jin Li:
Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control. 3-18 - Baodong Qin, Hui Cui, Xiaokun Zheng, Dong Zheng:

Improved Security Model for Public-Key Authenticated Encryption with Keyword Search. 19-38 - Yuanhao Wang, Qiong Huang, Hongbo Li, Meiyan Xiao, Jianye Huang, Guomin Yang

:
Public Key Encryption with Fuzzy Matching. 39-62 - Jim Barthel, Marc Beunardeau, Razvan Rosie, Rajeev Anand Sahu

:
Partitioned Searchable Encryption. 63-79
Key Exchange and Zero Knowledge Proof
- Tianqi Zhou, Jian Shen

, Sai Ji, Yongjun Ren, Mingwu Zhang:
Key Exposure Resistant Group Key Agreement Protocol. 83-97 - Jim Barthel, Razvan Rosie:

NIKE from Affine Determinant Programs. 98-115 - Jason Chia, Ji-Jian Chin

, Sook-Chin Yip
:
OrBit: OR-Proof Identity-Based Identification with Tight Security for (as Low As) 1-Bit Loss. 116-135 - Daiki Miyahara

, Hiromichi Haneda
, Takaaki Mizuki
:
Card-Based Zero-Knowledge Proof Protocols for Graph Problems and Their Computational Model. 136-152
Post Quantum Cryptography
- Satoshi Okada, Yuntao Wang

:
Recovery Attack on Bob's Reused Randomness in CRYSTALS-KYBER and SABER. 155-173 - Jinzheng Cao

, Yanbin Pan, Qingfeng Cheng
:
A Lattice Reduction Algorithm Based on Sublattice BKZ. 174-189 - Jim Barthel, Volker Müller, Razvan Rosie:

On the (M)iNTRU Assumption in the Integer Case. 190-211
Functional Encryption
- Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi

, Kazumasa Omote:
Verifiable Functional Encryption Using Intel SGX. 215-240 - Subhranil Dutta

, Tapas Pal
, Ratna Dutta:
Fully Secure Unbounded Zero Inner Product Encryption with Short Ciphertexts and Keys. 241-258 - Zhuoran Zhang, Zheng Zhang, Fangguo Zhang

:
Inner-Product Functional Encryption from Random Linear Codes: Trial and Challenges. 259-276
Digital Signature
- Ru Xiang, Sha Ma, Qiong Huang, Ximing Li

:
A CCA-Full-Anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model. 279-295 - Vikas Srivastava

, Sumit Kumar Debnath
:
Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme. 296-308 - Surbhi Shaw

, Ratna Dutta:
Identification Scheme and Forward-Secure Signature in Identity-Based Setting from Isogenies. 309-326 - Cheng-Jun Lin, Rui Xue, Xinyi Huang:

Linearly Homomorphic Signatures with Designated Combiner. 327-345 - Jixin Zhang, Jiageng Chen

, Weizhi Meng
:
Efficient Attribute-Based Signature for Monotone Predicates. 346-362
Practical Security Protocols
- Xiaoqing Deng

, Weiqi Luo
, Yanmei Fang:
Spatial Steganalysis Based on Gradient-Based Neural Architecture Search. 365-375 - Carlo Brunetta, Mario Larangeira, Bei Liang, Aikaterini Mitrokotsa, Keisuke Tanaka:

Turn-Based Communication Channels. 376-392

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














