Cryptology and Network Security 2019 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


18th CANS 2019: Fuzhou, China

jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Yi Mu, Robert H. Deng, Xinyi Huang:
Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25-27, 2019, Proceedings. Lecture Notes in Computer Science 11829, Springer 2019, ISBN 978-3-030-31577-1
Homomorphic Encryption

Vipin Singh Sehrawat
, Yvo Desmedt:
Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption. 3-23

Malika Izabachène, Renaud Sirdey
, Martin Zuber:
Practical Fully Homomorphic Encryption for Fully Masked Neural Networks. 24-36
SIKE and Hash

Hwajeong Seo, Amir Jalali, Reza Azarderakhsh:
SIKE Round 2 Speed Record on ARM Cortex-M4. 39-60

Wenqian Xin, Yunwen Liu
, Bing Sun, Chao Li:
Improved Cryptanalysis on SipHash. 61-79
Lattice and Post-quantum Cryptography

Rami El Khatib, Reza Azarderakhsh, Mehran Mozaffari Kermani
:
Optimized Algorithms and Architectures for Montgomery Multiplication for Post-quantum Cryptography. 83-98

Shixiong Wang, Juanyang Zhang, Jingnan He, Huaxiong Wang, Chao Li:
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices. 99-119

Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease. 120-140

Zhengyu Zhang, Puwen Wei, Haiyang Xue
:
Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting. 141-160
Searchable Encryption

Lanxiang Chen, Zhenchao Chen:
Practical, Dynamic and Efficient Integrity Verification for Symmetric Searchable Encryption. 163-183

Kai Chen, Zhongrui Lin, Jian Wan, Lei Xu
, Chungen Xu
:
Multi-owner Secure Encrypted Search Using Searching Adversarial Networks. 184-195
Blockchains

Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Fengkie Junis, Dony Ariadi Suwarsono:
Designing Smart Contract for Electronic Document Taxation. 199-213

Tsz Hon Yuen
:
PAChain: Private, Authenticated and Auditable Consortium Blockchain. 214-234

Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Limerlina:
Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol. 235-246
Cloud Security

Ulrich Haböck
, Stephan Krenn
:
Breaking and Fixing Anonymous Credentials for the Cloud. 249-269

Meng Zhang, Saiyu Qi, Meixia Miao, Fuyou Zhang:
Enabling Compressed Encryption for Cloud Based Big Data Stores. 270-287
Secret Sharing and Interval Test

Yvo Desmedt, Sabyasachi Dutta
, Kirill Morozov:
Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing. 291-307

Fuchun Lin, San Ling
, Huaxiong Wang, Neng Zeng:
Threshold Changeable Ramp Secret Sharing. 308-327

Hiraku Morita
, Nuttapong Attrapadung:
Client-Aided Two-Party Secure Interval Test Protocol. 328-343
LWE
Encryption, Data Aggregation, and Revocation

Amit Datta, Marc Joye, Nadia Fawaz
:
Private Data Aggregation over Selected Subsets of Users. 375-391

Yuting Cheng, Li Yang, Shui Yu
, Jianfeng Ma:
Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation. 392-411

Houda Ferradi, David Naccache:
Integer Reconstruction Public-Key Encryption. 412-433

Ankit Pradhan
, Kamalakanta Sethi, Shrohan Mohapatra, Padmalochan Bera:
Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata. 434-456

Kyu Young Choi
, Eunkyung Kim, Hyo Jin Yoon, Dukjae Moon, Jihoon Cho:
Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map. 457-469

Masayuki Tezuka
, Xiangyu Su, Keisuke Tanaka:
A t-out-of-n Redactable Signature Scheme. 470-489
Signature, ML, Payment, and Factorization

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






