default search action
ProvSec 2021: Guangzhou, China
- Qiong Huang, Yu Yu:
Provable and Practical Security - 15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021, Proceedings. Lecture Notes in Computer Science 13059, Springer 2021, ISBN 978-3-030-90401-2
Searchable Encryption
- Zhongming Wang, Biwen Chen, Tao Xiang, Lu Zhou, Yan-Hong Liu, Jin Li:
Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control. 3-18 - Baodong Qin, Hui Cui, Xiaokun Zheng, Dong Zheng:
Improved Security Model for Public-Key Authenticated Encryption with Keyword Search. 19-38 - Yuanhao Wang, Qiong Huang, Hongbo Li, Meiyan Xiao, Jianye Huang, Guomin Yang:
Public Key Encryption with Fuzzy Matching. 39-62 - Jim Barthel, Marc Beunardeau, Razvan Rosie, Rajeev Anand Sahu:
Partitioned Searchable Encryption. 63-79
Key Exchange and Zero Knowledge Proof
- Tianqi Zhou, Jian Shen, Sai Ji, Yongjun Ren, Mingwu Zhang:
Key Exposure Resistant Group Key Agreement Protocol. 83-97 - Jim Barthel, Razvan Rosie:
NIKE from Affine Determinant Programs. 98-115 - Jason Chia, Ji-Jian Chin, Sook-Chin Yip:
OrBit: OR-Proof Identity-Based Identification with Tight Security for (as Low As) 1-Bit Loss. 116-135 - Daiki Miyahara, Hiromichi Haneda, Takaaki Mizuki:
Card-Based Zero-Knowledge Proof Protocols for Graph Problems and Their Computational Model. 136-152
Post Quantum Cryptography
- Satoshi Okada, Yuntao Wang:
Recovery Attack on Bob's Reused Randomness in CRYSTALS-KYBER and SABER. 155-173 - Jinzheng Cao, Yanbin Pan, Qingfeng Cheng:
A Lattice Reduction Algorithm Based on Sublattice BKZ. 174-189 - Jim Barthel, Volker Müller, Razvan Rosie:
On the (M)iNTRU Assumption in the Integer Case. 190-211
Functional Encryption
- Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi, Kazumasa Omote:
Verifiable Functional Encryption Using Intel SGX. 215-240 - Subhranil Dutta, Tapas Pal, Ratna Dutta:
Fully Secure Unbounded Zero Inner Product Encryption with Short Ciphertexts and Keys. 241-258 - Zhuoran Zhang, Zheng Zhang, Fangguo Zhang:
Inner-Product Functional Encryption from Random Linear Codes: Trial and Challenges. 259-276
Digital Signature
- Ru Xiang, Sha Ma, Qiong Huang, Ximing Li:
A CCA-Full-Anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model. 279-295 - Vikas Srivastava, Sumit Kumar Debnath:
Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme. 296-308 - Surbhi Shaw, Ratna Dutta:
Identification Scheme and Forward-Secure Signature in Identity-Based Setting from Isogenies. 309-326 - Cheng-Jun Lin, Rui Xue, Xinyi Huang:
Linearly Homomorphic Signatures with Designated Combiner. 327-345 - Jixin Zhang, Jiageng Chen, Weizhi Meng:
Efficient Attribute-Based Signature for Monotone Predicates. 346-362
Practical Security Protocols
- Xiaoqing Deng, Weiqi Luo, Yanmei Fang:
Spatial Steganalysis Based on Gradient-Based Neural Architecture Search. 365-375 - Carlo Brunetta, Mario Larangeira, Bei Liang, Aikaterini Mitrokotsa, Keisuke Tanaka:
Turn-Based Communication Channels. 376-392
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.