


default search action
ProvSec 2025: Yokohama, Japan
- Guomin Yang

, Shengli Liu, Chunhua Su
, Akira Otsuka
, Zhuotao Lian
:
Provable and Practical Security - 19th International Conference, ProvSec 2025, Yokohama, Japan, October 10-12, 2025, Proceedings. Lecture Notes in Computer Science 16172, Springer 2026, ISBN 978-981-95-2960-5
Digital Signature
- Nam Tran, Khoa Nguyen

, Dongxi Liu
, Josef Pieprzyk
, Willy Susilo
:
Many-Time Linkable Ring Signatures. 3-22 - Yuuki Fujita, Keisuke Hara

, Kyosuke Yamashita
:
Claimable Multi-designated Verifier Signature. 23-43 - Keisuke Hara

, Masayuki Tezuka
:
Logarithmic-Size Ring Signatures with Tight Security from the DL Assumption. 44-64 - Liuyu Yang, Xinxuan Zhang, Yi Deng, Xudong Zhu, Zhuo Wu, Zhongliang Zhang:

Registered Attribute-Based Signature with Attribute Privacy. 65-87 - Nikita Snetkov

, Jelizaveta Vakarjuk
, Peeter Laud
:
Electrum: UC Fail-Stop Server-Supported Signatures. 88-107
Post-quantum Cryptography
- Xinyu Zhang, Qishuang Fu, Ron Steinfeld, Joseph K. Liu, Tsz Hon Yuen, Man Ho Au:

Plum: SNARK-Friendly Post-Quantum Signature Based on Power Residue PRFs. 111-129 - Honghui Ye, Xinjian Chen, Qiong Huang:

A NTRU Lattice Based Linkable DualRing Signature. 130-149 - Wen Zhang, Lu Zhou, Hao Yang, Zhe Liu:

Optimized Implementation of NTRU on RISC-V Platform. 150-165 - Kazutaka Toda, Yuntao Wang

:
Proposal of An SVP Solver on Prime Cyclotomic Lattices. 166-182
Machine Learning Security and Privacy
- Tu Huang, Na Ruan:

AdvPurge: A Robust Personalized Federated Learning Framework Against Backdoor Attack. 185-201 - Ziang Wu

, Xiuheng Liao, Buzhen He
, Shuai Shang
, Tianhui Li
, Chunhua Su
:
Federated Intrusion Detection Under Non-IID Traffic. 202-217 - Bingchang He

, Atsuko Miyaji
:
Dynamic Self-feedback Mechanism for Improved Privacy Budgeting in LDP-SGD. 218-234 - Ying Ding, Weizhi Meng, Shaoming He, Wenjuan Li:

A Deep Reinforcement Learning Framework for Robust Maritime Collision Avoidance Under GPS Spoofing. 235-254 - Sukkarin Ruensukont, Karin Sumonkayothin

, Prarinya Siritanawan
, Narit Hnoohom
, Setthawhut Saennam, Razvan Beuran
:
Network Intrusion Detection System Based on Reinforcement Learning Technique Optimization. 255-276
Cryptographic Protocol
- Foo Yee Yeo, Jason H. M. Ying:

A Round-Optimal Near-Linear Third-Party Private Set Intersection Protocol. 279-298 - Lourenço Abecasis

, Paulo Mateus
, Chrysoula Vlachou
:
An Attack to Universally Composable Commitments from Malicious Physically Uncloneable Functions and How to Avoid It. 299-326
Searchable Encryption
- Huu Ngoc Duc Nguyen

, Shujie Cui
, Shangqi Lai
, Tsz Hon Yuen
, Joseph K. Liu
:
More Practical Non-interactive Encrypted Conjunctive Search with Leakage and Storage Suppression. 329-349 - Minghui He, Zesheng Lin, Hongbo Li, Xinjian Chen, Qiong Huang:

Lattice-Based Certificateless Encryption with Keyword Search. 350-367 - Jun Zhao

, Jiangshan Yu
, Xingliang Yuan
, Joseph K. Liu
, Cong Zuo
, Hui Cui
:
SEARCHAIN: Searchable Encryption As Rewarded-Useful-Work on Blockchain. 368-384
Cryptanalysis
- Sumesh Manjunath Ramesh

, Hoda Alkhzaimi:
DHABI FRAMEWORK: A Hybrid Approach to Overcoming Resistance Against Statistical Cryptanalysis and Side-Channel Analysis. 387-406
Distributed System and Blockchain Security
- Wenkuan Xiao, Qianhong Wu

, Wenbo Wu, Sipeng Xie
, Bo Qin
:
AccountCatcher: Anomaly Blockchain Account Detection Based on Hybrid Graph-Based Model. 409-425 - Peter Ince, Jiangshan Yu, Joseph K. Liu, Xiaoning Du, Xiapu Luo:

GenDetect: Generative Large Language Model Usage in Smart Contract Vulnerability Detection. 426-445
Short Papers
- Raghav Sharma, Amit Gupta:

Source Code Guardrail: AI Driven Solution to Distinguish Critical vs. Generic Code for Enterprise LLM Security. 449-458 - Joya Biswas, Rutaban Jania, Jahid Hossain, Mohammad Farhan Ferdous, Shakik Mahmud, Jiageng Chen, Rashed Mazumder:

An Empirical Study of Variation of Blockchain to Address the Issue of Verification and Validation. 459-469 - Shogo Kuramoto, Atsuko Miyaji

:
Improved Constant-Time Modular Inversion. 470-480
Posters
- Kyohei Shiomi, Zhuotao Lian, Toru Nakanishi, Teruaki Kitasuka:

POSTER: Tricking LLM-Based NPCs into Spilling Secrets. 483-487 - Qipeng Xie, Jiafei Wu, Weiyu Wang, Zhuotao Lian, Mu Yuan, Xian Shuai, Weizheng Wang, Yuan Haoyi, Haibo Hu, Kaishun Wu:

Privacy-Preserving LLM Agent for Multi-modal Health Monitoring. 488-492 - Hong Zhao, Zhuotao Lian, Xinsheng Wang, Enting Guo:

POSTER: AI-Based Physical Layer Key Generation Mechanism. 493-497 - Qingkui Zeng

, Zhuotao Lian
:
POSTER: A Server-Side Proactive Defense Framework for Poison-Resilient Federated Learning. 498-502 - Yuntao Wang

, Kazutaka Toda:
POSTER: An Efficient Sieve Algorithm for Ideal Lattices. 503-507

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














