Information Security and Cryptology

Information Security and Cryptology portes grátis

Information Security and Cryptology

19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I

Ge, Chunpeng; Yung, Moti

Springer Verlag, Singapore

02/2024

475

Mole

Inglês

9789819709410

15 a 20 dias

Descrição não disponível.
?Signature: TVES: Threshold Verifiably Encrypted Signature and Its Applications.- Compact Accountable Ring Signatures in the Plain Model.- Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.- Compact Ring Signatures with Post-Quantum Security in Standard Model.- Secure Multi-Party SM2 Signature based on SPDZ Protocol.- Blockchain: Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption.- A General Federated Learning Scheme with Blockchain on non-IID Data.- A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy Preservation.- Cryptography primitive: General Constructions of Fuzzy Extractors for Continuous Sources.- Geometry-based Garbled Circuits Relying Solely on One Evaluation Algorithm under Standard Assumption.- Full Domain Functional Bootstrapping with Least Significant Bit Encoding.- Public key cryptography: PFE: Linear Active Security, Double-Shuffle Proofs, and LowComplexity Communication.- CCA-secure Identity-Based Matchmaking Encryption from Standard Assumptions.-Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications.- Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction.- Identity-Based Proxy Re-encryption Based on SM9.- Security and Privacy: SecCDS: Secure Crowdsensing Data Sharing Scheme Supporting Aggressive Query.- An Improved Method for Evaluating Secret Variables and Its Application to WAGE.- Exploring Emotion Trends in Product Reviews: A Multi-modal Analysis with Malicious Comment Filtering and User Privacy Protection.- XPORAM: A Practical Multi-Client ORAM against Malicious Adversaries.- A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement.- A Lightweight Access Control Scheme Supporting Policy Hidden based on Path Bloom Filter.- MFL-RAT: Multi-class Few-shot Learning Method For Encrypted RAT Traffic Detection.
cryptography;formal methods and theory of security;security services;network security;database and storage security;software and application security;human and societal aspects of security and privacy;data security;network security