


default search action
ProvSec 2022: Nanjing, China
- Chunpeng Ge, Fuchun Guo
:
Provable and Practical Security - 16th International Conference, ProvSec 2022, Nanjing, China, November 11-12, 2022, Proceedings. Lecture Notes in Computer Science 13600, Springer 2022, ISBN 978-3-031-20916-1
Encryption
- Kyoichi Asano
, Keita Emura
, Atsushi Takayasu
, Yohei Watanabe
:
A Generic Construction of CCA-Secure Attribute-Based Encryption with Equality Test. 3-19 - Pan Yang, Hongbo Li, Jianye Huang, Hao Zhang, Man Ho Au, Qiong Huang:
Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search. 20-35 - Geng Wang
, Ming Wan
, Dawu Gu
:
More Efficient Verifiable Functional Encryption. 36-51 - Marcel Armour
, Elizabeth A. Quaglia
:
Subverting Deniability. 52-59 - Jodie Knapp
, Elizabeth A. Quaglia
:
Epoch Confidentiality in Updatable Encryption. 60-67
Lattice Based Cryptography
- Yanhua Zhang
, Ximeng Liu
, Yupu Hu
:
Simplified Server-Aided Revocable Identity-Based Encryption from Lattices. 71-87 - Yuntao Wang
, Yasuhiko Ikematsu
, Takanori Yasuda
:
Lattice-Based Public Key Cryptosystems Invoking Linear Mapping Mask. 88-104 - Yuting Jiang
, Jianghong Wei
, Jing Pan
:
Batched Fully Dynamic Multi-key FHE from FHEW-Like Cryptosystems. 105-120 - Priyanka Dutta
, Dung Hoang Duong
, Willy Susilo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices. 121-136
Information Security
- Jian Huang
, Shanliang Xue
, Caiyi Wang
:
Fast Out-of-Band Data Integrity Monitor to Mitigate Memory Corruption Attacks. 139-155 - Ge Zhang
, Yu Geng
, Xueman Kong
, Yifa Li
:
Construction of a New UAV Management System Based on UMIA Technology. 156-166 - Zhaobo Lu
, Yilei Wang
, Qingzhe Lv
, Minghao Zhao
, Tiancai Liang
:
FP2-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning. 167-175 - Yu Li
, Junzuo Lai
, Xiaowei Yuan
, Beibei Song
:
Practical Federated Learning for Samples with Different IDs. 176-195
Blockchain
- Zhaojie Wang
, Willy Susilo
, Jianan Guo
, Yilei Wang
, Minghao Zhao
:
Reinforcement-Mining: Protecting Reward in Selfish Mining. 199-209 - Wei-Yang Chiu
, Weizhi Meng
, Wenjuan Li
, Liming Fang
:
FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS Attacks. 210-227 - Juzheng Huang
, Qiang Tang
, Chunhua Su
, Na Ruan
:
Secure Collaboration Between Consortiums in Permissioned Blockchains. 228-245
Foundations
- Carsten Baum
, Bernardo David, Rafael Dowsley
:
(Public) Verifiability for Composable Protocols Without Adaptivity or Zero-Knowledge. 249-272 - Anit Kumar Ghosal
, Satrajit Ghosh
, Dipanwita Roychowdhury
:
Practical Non-malleable Codes from Symmetric-Key Primitives in 2-Split-State Model. 273-281 - Bin Liu
, Antonis Michalas
, Bogdan Warinschi
:
Cryptographic Role-Based Access Control, Reconsidered. 282-289

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.