default search action
22nd ACNS 2024: Abu Dhabi, UAE - Part I
- Christina Pöpper, Lejla Batina:
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14583, Springer 2024, ISBN 978-3-031-54769-0
Cryptographic Protocols
- Chris Brzuska, Christoph Egger, Kirthivaasan Puniamurthy:
CryptoZoo: A Viewer for Reduction Proofs. 3-25 - Xavier Carpent, Seoyeon Hwang, Gene Tsudik:
Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols. 26-57 - Tore Kasper Frederiksen, Jonas Lindstrøm, Mikkel Wienberg Madsen, Anne Dorte Spangsberg:
A New Approach to Efficient and Secure Fixed-Point Computation. 58-87 - Pengfei Wang, Xiangyu Su, Mario Larangeira, Keisuke Tanaka:
Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing. 88-118 - Kittiphop Phalakarn, Toru Nakamura:
Verification Protocol for Stable Matching from Conditional Disclosure of Secrets. 119-134 - Danilo Francati, Daniele Venturi:
Non-malleable Fuzzy Extractors. 135-155 - Chloé Cachet, Ariel Hamlin, Maryam Rezapour, Benjamin Fuller:
Upgrading Fuzzy Extractors. 156-182 - Edoardo Liberati, Alessandro Visintin, Riccardo Lazzeretti, Mauro Conti, A. Selcuk Uluagac:
X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices. 183-210
Encrypted Data
- Mengyu Zhang, Long Wang, Xiaoping Zhang, Zhuotao Liu, Yisong Wang, Han Bao:
Efficient Clustering on Encrypted Data. 213-236 - Keita Emura:
Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search. 237-256 - Thi Van Thao Doan, Olivier Pereira, Thomas Peters:
Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections. 257-287 - Robin Berger, Felix Dörre, Alexander Koch:
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption. 288-317 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More. 318-347
Signatures
- Pascal Bemmann, Sebastian Berndt, Rongmao Chen:
Subversion-Resilient Signatures Without Random Oracles. 351-375 - Nabil Alkeilani Alkadri, Nico Döttling, Sihang Pu:
Practical Lattice-Based Distributed Signatures for a Small Number of Signers. 376-402 - Thibauld Feneuil:
Building MPCitH-Based Signatures from MQ, MinRank, and Rank SD. 403-431 - Andrea Basso, Mingjie Chen, Tako Boris Fouotsa, Péter Kutas, Abel Laval, Laurane Marco, Gustave Tchoffo Saah:
Exploring SIDH-Based Signature Parameters. 432-456 - Luk Bettale, Delaram Kahrobaei, Ludovic Perret, Javier A. Verbel:
Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials. 457-486
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.