


default search action
ProvSec 2023: Wuhan, China
- Mingwu Zhang

, Man Ho Au
, Yudi Zhang
:
Provable and Practical Security - 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings. Lecture Notes in Computer Science 14217, Springer 2023, ISBN 978-3-031-45512-4
Fundamentals and Cryptographic Primitives
- Yuan Tian, Xinke Tian, Yongda Pang:

Efficient Zero-Knowledge Arguments for Matrix Relations over Rings and Non-malleable Enhancement. 3-26 - Fuhu Wu, Lin Wang, Shun Zhang, Jie Cui, Hong Zhong:

Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation. 27-43 - Hao Zhu, Fagen Li, Lihui Liu, Yong Zeng, Xiaoli Li, Jianfeng Ma:

Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections. 44-63
Cryptanalysis
- Wenhao Shi, Jiang Han, Haodong Jiang, Zhi Ma:

Improved Key-Recovery Attacks Under Imperfect SCA Oracle for Lattice-Based KEMs. 67-82 - Hong Xu, Chunyu Hao, Zhichao Xu, Wenfeng Qi:

Linear Cryptanalysis of Lightweight Block Cipher WARP. 83-90 - Zahra Javar

, Bruce M. Kapron
:
Linicrypt in the Ideal Cipher Model. 91-111
Signature
- Yibing Wang, Xiaoxiao Wang, Chin-Tser Huang, Dejun Wang, Binhao Ma, Bo Meng:

SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature Between PKI and IBC. 115-130 - Masahito Ishizaka:

Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications. 131-156 - Ran Xu, Yanwei Zhou, Yu Han, Bo Yang:

A Certificateless Aggregate Signature Scheme with Better Security. 157-165 - Simin Chen, Jiageng Chen

, Atsuko Miyaji
, Kaiming Chen:
Constant-Size Group Signatures with Message-Dependent Opening from Lattices. 166-185 - Jiaming Wen

, Houzhen Wang
, Huanguo Zhang:
Post-quantum Sigma Protocols and Signatures from Low-Rank Matrix Completions. 186-206 - Minh Thuy Truc Pham, Dung Hoang Duong, Yannan Li, Willy Susilo

:
Threshold Ring Signature Scheme from Cryptographic Group Action. 207-227
Encryption
- Yuzhu Wang, Xingbo Wang, Mingwu Zhang:

Homomorphic Witness Encryption from Indistinguishable Obfuscation. 231-250 - Sohto Chiku

, Keisuke Hara, Junji Shikata:
Identity-Based Matchmaking Encryption Secure Against Key Generation Center. 251-273 - Bishnu Charan Behera, Somindu C. Ramanna:

Multi-input Functional Encryption for Unbounded Inner Products. 274-289 - Weihan Huang

, Min Luo
, Cong Peng
, Debiao He
:
FleS: A Compact and Parameter-Flexible Supersingular Isogeny Based Public Key Encryption Scheme. 290-308 - Lifeng Guo

, Lingxia Wang
, Xueke Ma
, Qianli Ma
:
A New Revocable Attribute Based Encryption on Lattice. 309-326 - Zihao Liu, Ruixuan Deng, Chongxi Guan, Hua Shen:

An Efficient Keyword-Based Ciphertext Retrieval Scheme. 327-341
Privacy Preservation
- Yanxiang Deng

, Lin Liu
, Shaojing Fu
, Yuchuan Luo
, Wei Wu
, Shixiong Wang
:
Privacy Preserving Outsourced K-means Clustering Using Kd-tree. 345-364 - Zehui Tang, Shengke Zeng, Tao Li, Shuai Cheng, Haoyu Zheng:

Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency. 365-384 - Lang Xu, Jiqiang Li, Hao Zhang, Hua Shen:

A Privacy-Preserving Takeaway Delivery Service Scheme. 385-403
Blockchain Security
- Meng Huang, Jia Yang, Cong Liu:

CDRF: A Detection Method of Smart Contract Vulnerability Based on Random Forest. 407-428 - Zunlong Zhou, Wen Chen, Linrui Li, Yilin Zhang:

simuBits: Pool Security Verification of Novel Mining Attacks. 429-447

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














