


default search action
ProvSec 2022: Nanjing, China
- Chunpeng Ge, Fuchun Guo

:
Provable and Practical Security - 16th International Conference, ProvSec 2022, Nanjing, China, November 11-12, 2022, Proceedings. Lecture Notes in Computer Science 13600, Springer 2022, ISBN 978-3-031-20916-1
Encryption
- Kyoichi Asano

, Keita Emura
, Atsushi Takayasu
, Yohei Watanabe
:
A Generic Construction of CCA-Secure Attribute-Based Encryption with Equality Test. 3-19 - Pan Yang, Hongbo Li, Jianye Huang, Hao Zhang, Man Ho Au, Qiong Huang:

Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search. 20-35 - Geng Wang

, Ming Wan
, Dawu Gu
:
More Efficient Verifiable Functional Encryption. 36-51 - Marcel Armour

, Elizabeth A. Quaglia
:
Subverting Deniability. 52-59 - Jodie Knapp

, Elizabeth A. Quaglia
:
Epoch Confidentiality in Updatable Encryption. 60-67
Lattice Based Cryptography
- Yanhua Zhang

, Ximeng Liu
, Yupu Hu
:
Simplified Server-Aided Revocable Identity-Based Encryption from Lattices. 71-87 - Yuntao Wang

, Yasuhiko Ikematsu
, Takanori Yasuda
:
Lattice-Based Public Key Cryptosystems Invoking Linear Mapping Mask. 88-104 - Yuting Jiang

, Jianghong Wei
, Jing Pan
:
Batched Fully Dynamic Multi-key FHE from FHEW-Like Cryptosystems. 105-120 - Priyanka Dutta

, Dung Hoang Duong
, Willy Susilo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices. 121-136
Information Security
- Jian Huang

, Shanliang Xue
, Caiyi Wang
:
Fast Out-of-Band Data Integrity Monitor to Mitigate Memory Corruption Attacks. 139-155 - Ge Zhang

, Yu Geng
, Xueman Kong
, Yifa Li
:
Construction of a New UAV Management System Based on UMIA Technology. 156-166 - Zhaobo Lu

, Yilei Wang
, Qingzhe Lv
, Minghao Zhao
, Tiancai Liang
:
FP2-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning. 167-175 - Yu Li

, Junzuo Lai
, Xiaowei Yuan
, Beibei Song
:
Practical Federated Learning for Samples with Different IDs. 176-195
Blockchain
- Zhaojie Wang

, Willy Susilo
, Jianan Guo
, Yilei Wang
, Minghao Zhao
:
Reinforcement-Mining: Protecting Reward in Selfish Mining. 199-209 - Wei-Yang Chiu

, Weizhi Meng
, Wenjuan Li
, Liming Fang
:
FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS Attacks. 210-227 - Juzheng Huang

, Qiang Tang
, Chunhua Su
, Na Ruan
:
Secure Collaboration Between Consortiums in Permissioned Blockchains. 228-245
Foundations
- Carsten Baum

, Bernardo David, Rafael Dowsley
:
(Public) Verifiability for Composable Protocols Without Adaptivity or Zero-Knowledge. 249-272 - Anit Kumar Ghosal

, Satrajit Ghosh
, Dipanwita Roychowdhury
:
Practical Non-malleable Codes from Symmetric-Key Primitives in 2-Split-State Model. 273-281 - Bin Liu

, Antonis Michalas
, Bogdan Warinschi
:
Cryptographic Role-Based Access Control, Reconsidered. 282-289

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














