Information Security and Cryptology 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part I

The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9–10, 2023. The 38 full papers and 7 short papers presented in these proceedings were care...

Full description

Bibliographic Details
Other Authors: Ge, Chunpeng (Editor), Yung, Moti (Editor)
Format: eBook
Language:English
Published: Singapore Springer Nature Singapore 2024, 2024
Edition:1st ed. 2024
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Public key cryptography: PFE: Linear Active Security, Double-Shuffle Proofs, and LowComplexity Communication
  • CCA-secure Identity-Based Matchmaking Encryption from Standard Assumptions.-Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications
  • Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction
  • Identity-Based Proxy Re-encryption Based on SM9
  • Security and Privacy: SecCDS: Secure Crowdsensing Data Sharing Scheme Supporting Aggressive Query
  • An Improved Method for Evaluating Secret Variables and Its Application to WAGE
  • Exploring Emotion Trends in Product Reviews: A Multi-modal Analysis with Malicious Comment Filtering and User Privacy Protection
  • XPORAM: A Practical Multi-Client ORAM against Malicious Adversaries
  • A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement
  • Signature: TVES: Threshold Verifiably Encrypted Signature and Its Applications
  • Compact Accountable Ring Signatures in the Plain Model
  • Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
  • Compact Ring Signatures with Post-Quantum Security in Standard Model
  • Secure Multi-Party SM2 Signature based on SPDZ Protocol
  • Blockchain: Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption
  • A General Federated Learning Scheme with Blockchain on non-IID Data
  • A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy Preservation
  • Cryptography primitive: General Constructions of Fuzzy Extractors for Continuous Sources
  • Geometry-based Garbled Circuits Relying Solely on One Evaluation Algorithm under Standard Assumption
  • Full Domain Functional Bootstrapping with Least Significant Bit Encoding
  • A Lightweight Access Control Scheme Supporting Policy Hidden based on Path Bloom Filter
  • MFL-RAT: Multi-class Few-shot Learning Method For Encrypted RAT Traffic Detection