default search action
18th CANS 2019: Fuzhou, China
- Yi Mu, Robert H. Deng, Xinyi Huang:
Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings. Lecture Notes in Computer Science 11829, Springer 2019, ISBN 978-3-030-31577-1
Homomorphic Encryption
- Vipin Singh Sehrawat, Yvo Desmedt:
Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption. 3-23 - Malika Izabachène, Renaud Sirdey, Martin Zuber:
Practical Fully Homomorphic Encryption for Fully Masked Neural Networks. 24-36
SIKE and Hash
- Hwajeong Seo, Amir Jalali, Reza Azarderakhsh:
SIKE Round 2 Speed Record on ARM Cortex-M4. 39-60 - Wenqian Xin, Yunwen Liu, Bing Sun, Chao Li:
Improved Cryptanalysis on SipHash. 61-79
Lattice and Post-quantum Cryptography
- Rami El Khatib, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Optimized Algorithms and Architectures for Montgomery Multiplication for Post-quantum Cryptography. 83-98 - Shixiong Wang, Juanyang Zhang, Jingnan He, Huaxiong Wang, Chao Li:
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices. 99-119 - Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease. 120-140 - Zhengyu Zhang, Puwen Wei, Haiyang Xue:
Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting. 141-160
Searchable Encryption
- Lanxiang Chen, Zhenchao Chen:
Practical, Dynamic and Efficient Integrity Verification for Symmetric Searchable Encryption. 163-183 - Kai Chen, Zhongrui Lin, Jian Wan, Lei Xu, Chungen Xu:
Multi-owner Secure Encrypted Search Using Searching Adversarial Networks. 184-195
Blockchains
- Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Fengkie Junis, Dony Ariadi Suwarsono:
Designing Smart Contract for Electronic Document Taxation. 199-213 - Tsz Hon Yuen:
PAChain: Private, Authenticated and Auditable Consortium Blockchain. 214-234 - Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Limerlina:
Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol. 235-246
Cloud Security
- Ulrich Haböck, Stephan Krenn:
Breaking and Fixing Anonymous Credentials for the Cloud. 249-269 - Meng Zhang, Saiyu Qi, Meixia Miao, Fuyou Zhang:
Enabling Compressed Encryption for Cloud Based Big Data Stores. 270-287
Secret Sharing and Interval Test
- Yvo Desmedt, Sabyasachi Dutta, Kirill Morozov:
Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing. 291-307 - Fuchun Lin, San Ling, Huaxiong Wang, Neng Zeng:
Threshold Changeable Ramp Secret Sharing. 308-327 - Hiraku Morita, Nuttapong Attrapadung:
Client-Aided Two-Party Secure Interval Test Protocol. 328-343
LWE
- Deevashwer Rathee, Thomas Schneider, K. K. Shukla:
Improved Multiplication Triple Generation over Rings via RLWE-Based AHE. 347-359 - Gérald Gavin, Stéphane Bonnevay:
Fractional LWE: A Nonlinear Variant of LWE. 360-371
Encryption, Data Aggregation, and Revocation
- Amit Datta, Marc Joye, Nadia Fawaz:
Private Data Aggregation over Selected Subsets of Users. 375-391 - Yuting Cheng, Li Yang, Shui Yu, Jianfeng Ma:
Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation. 392-411 - Houda Ferradi, David Naccache:
Integer Reconstruction Public-Key Encryption. 412-433 - Ankit Pradhan, Kamalakanta Sethi, Shrohan Mohapatra, Padmalochan Bera:
Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata. 434-456 - Kyu Young Choi, Eunkyung Kim, Hyo Jin Yoon, Dukjae Moon, Jihoon Cho:
Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map. 457-469 - Masayuki Tezuka, Xiangyu Su, Keisuke Tanaka:
A t-out-of-n Redactable Signature Scheme. 470-489
Signature, ML, Payment, and Factorization
- Ali Burak Ünal, Mete Akgün, Nico Pfeifer:
A Framework with Randomized Encoding for a Fast Privacy Preserving Calculation of Non-linear Kernels for Machine Learning Applications in Precision Medicine. 493-511 - Yangguang Tian, Yingjiu Li, Binanda Sengupta, Nan Li, Yong Yu:
Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion. 512-524 - Mengce Zheng, Honggang Hu:
Implicit Related-Key Factorization Problem on the RSA Cryptosystem. 525-537
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.