Normal view MARC view ISBD view

Information Security and Cryptology [electronic resource] : 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I / edited by Chunpeng Ge, Moti Yung.

Contributor(s): Ge, Chunpeng [editor.] | Yung, Moti [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 14526Publisher: Singapore : Springer Nature Singapore : Imprint: Springer, 2024Edition: 1st ed. 2024.Description: XVII, 475 p. 112 illus., 71 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9789819709427.Subject(s): Data protection | Image processing -- Digital techniques | Computer vision | Computer networks  | Application software | Computer networks -- Security measures | Cryptography | Data encryption (Computer science) | Data and Information Security | Computer Imaging, Vision, Pattern Recognition and Graphics | Computer Communication Networks | Computer and Information Systems Applications | Mobile and Network Security | CryptologyAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Signature: TVES: Threshold Verifiably Encrypted Signature and Its Applications -- Compact Accountable Ring Signatures in the Plain Model -- Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key -- Compact Ring Signatures with Post-Quantum Security in Standard Model -- Secure Multi-Party SM2 Signature based on SPDZ Protocol -- Blockchain: Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption -- A General Federated Learning Scheme with Blockchain on non-IID Data -- A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy Preservation -- Cryptography primitive: General Constructions of Fuzzy Extractors for Continuous Sources -- Geometry-based Garbled Circuits Relying Solely on One Evaluation Algorithm under Standard Assumption -- Full Domain Functional Bootstrapping with Least Significant Bit Encoding -- Public key cryptography: PFE: Linear Active Security, Double-Shuffle Proofs, and LowComplexity Communication -- CCA-secure Identity-Based Matchmaking Encryption from Standard Assumptions.-Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications -- Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction -- Identity-Based Proxy Re-encryption Based on SM9 -- Security and Privacy: SecCDS: Secure Crowdsensing Data Sharing Scheme Supporting Aggressive Query -- An Improved Method for Evaluating Secret Variables and Its Application to WAGE -- Exploring Emotion Trends in Product Reviews: A Multi-modal Analysis with Malicious Comment Filtering and User Privacy Protection -- XPORAM: A Practical Multi-Client ORAM against Malicious Adversaries -- A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement -- A Lightweight Access Control Scheme Supporting Policy Hidden based on Path Bloom Filter -- MFL-RAT: Multi-class Few-shot Learning Method For Encrypted RAT Traffic Detection.
In: Springer Nature eBookSummary: The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9-10, 2023. The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; Part II: System security; cryptography engineering; cryptanalysis; short papers, posters.
    average rating: 0.0 (0 votes)
No physical items for this record

Signature: TVES: Threshold Verifiably Encrypted Signature and Its Applications -- Compact Accountable Ring Signatures in the Plain Model -- Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key -- Compact Ring Signatures with Post-Quantum Security in Standard Model -- Secure Multi-Party SM2 Signature based on SPDZ Protocol -- Blockchain: Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption -- A General Federated Learning Scheme with Blockchain on non-IID Data -- A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy Preservation -- Cryptography primitive: General Constructions of Fuzzy Extractors for Continuous Sources -- Geometry-based Garbled Circuits Relying Solely on One Evaluation Algorithm under Standard Assumption -- Full Domain Functional Bootstrapping with Least Significant Bit Encoding -- Public key cryptography: PFE: Linear Active Security, Double-Shuffle Proofs, and LowComplexity Communication -- CCA-secure Identity-Based Matchmaking Encryption from Standard Assumptions.-Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications -- Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction -- Identity-Based Proxy Re-encryption Based on SM9 -- Security and Privacy: SecCDS: Secure Crowdsensing Data Sharing Scheme Supporting Aggressive Query -- An Improved Method for Evaluating Secret Variables and Its Application to WAGE -- Exploring Emotion Trends in Product Reviews: A Multi-modal Analysis with Malicious Comment Filtering and User Privacy Protection -- XPORAM: A Practical Multi-Client ORAM against Malicious Adversaries -- A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement -- A Lightweight Access Control Scheme Supporting Policy Hidden based on Path Bloom Filter -- MFL-RAT: Multi-class Few-shot Learning Method For Encrypted RAT Traffic Detection.

The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9-10, 2023. The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; Part II: System security; cryptography engineering; cryptanalysis; short papers, posters.

There are no comments for this item.

Log in to your account to post a comment.