menu 简单麦麦
account_circle

密码学与网络安全:第18届国际会议,CAN2019,中国福州,2019年10月25-27日,会议记录-Cryptology and Network Security: 18th Internation

帮助2581人找到了他们想要的文件
上传于 2020-03-02 33次下载 1877次围观
文件编号:6149
文件详情
标题(title):Cryptology and Network Security: 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings
密码学与网络安全:第18届国际会议,CAN2019,中国福州,2019年10月25-27日,会议记录
作者(author):Yi Mu, Robert H. Deng, Xinyi Huang
出版社(publisher):Springer International Publishing
大小(size):19 MB (19884469 bytes)
格式(extension):pdf
注意:如果文件下载完成后为无法打开的格式,请修改后缀名为格式对应后缀





This book constitutes the refereed proceedings of the 18th International Conference on Cryptology and Network Security, CANS 2019, held in Fuzhou, China, in October 2019.
The 21 full papers and 8 short papers were carefully reviewed and selected from 55 submissions. The papers focus on topics such as homomorphic encryption; SIKE and Hash; lattice and post-quantum cryptography; searchable encryption; blockchains, cloud security; secret sharing and interval test, LWE; encryption, data aggregation, and revocation; and signature, ML, payment, and factorization.





Table of contents :
Front Matter ....Pages i-xiii
Front Matter ....Pages 1-1
Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption (Vipin Singh Sehrawat, Yvo Desmedt)....Pages 3-23
Practical Fully Homomorphic Encryption for Fully Masked Neural Networks (Malika Izabachène, Renaud Sirdey, Martin Zuber)....Pages 24-36
Front Matter ....Pages 37-37
SIKE Round 2 Speed Record on ARM Cortex-M4 (Hwajeong Seo, Amir Jalali, Reza Azarderakhsh)....Pages 39-60
Improved Cryptanalysis on SipHash (Wenqian Xin, Yunwen Liu, Bing Sun, Chao Li)....Pages 61-79
Front Matter ....Pages 81-81
Optimized Algorithms and Architectures for Montgomery Multiplication for Post-quantum Cryptography (Rami El Khatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani)....Pages 83-98
Simplified Revocable Hierarchical Identity-Based Encryption from Lattices (Shixiong Wang, Juanyang Zhang, Jingnan He, Huaxiong Wang, Chao Li)....Pages 99-119
Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease (Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia)....Pages 120-140
Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting (Zhengyu Zhang, Puwen Wei, Haiyang Xue)....Pages 141-160
Front Matter ....Pages 161-161
Practical, Dynamic and Efficient Integrity Verification for Symmetric Searchable Encryption (Lanxiang Chen, Zhenchao Chen)....Pages 163-183
Multi-owner Secure Encrypted Search Using Searching Adversarial Networks (Kai Chen, Zhongrui Lin, Jian Wan, Lei Xu, Chungen Xu)....Pages 184-195
Front Matter ....Pages 197-197
Designing Smart Contract for Electronic Document Taxation (Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Fengkie Junis, Dony Ariadi Suwarsono)....Pages 199-213
PAChain: Private, Authenticated and Auditable Consortium Blockchain (Tsz Hon Yuen)....Pages 214-234
Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol (Dimaz Ankaa Wijaya, Joseph Liu, Ron Steinfeld, Dongxi Liu, Limerlina)....Pages 235-246
Front Matter ....Pages 247-247
Breaking and Fixing Anonymous Credentials for the Cloud (Ulrich Haböck, Stephan Krenn)....Pages 249-269
Enabling Compressed Encryption for Cloud Based Big Data Stores (Meng Zhang, Saiyu Qi, Meixia Miao, Fuyou Zhang)....Pages 270-287
Front Matter ....Pages 289-289
Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing (Yvo Desmedt, Sabyasachi Dutta, Kirill Morozov)....Pages 291-307
Threshold Changeable Ramp Secret Sharing (Fuchun Lin, San Ling, Huaxiong Wang, Neng Zeng)....Pages 308-327
Client-Aided Two-Party Secure Interval Test Protocol (Hiraku Morita, Nuttapong Attrapadung)....Pages 328-343
Front Matter ....Pages 345-345
Improved Multiplication Triple Generation over Rings via RLWE-Based AHE (Deevashwer Rathee, Thomas Schneider, K. K. Shukla)....Pages 347-359
Fractional LWE: A Nonlinear Variant of LWE (Gerald Gavin, Stephane Bonnevay)....Pages 360-371
Front Matter ....Pages 373-373
Private Data Aggregation over Selected Subsets of Users (Amit Datta, Marc Joye, Nadia Fawaz)....Pages 375-391
Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation (Yuting Cheng, Li Yang, Shui Yu, Jianfeng Ma)....Pages 392-411
Integer Reconstruction Public-Key Encryption (Houda Ferradi, David Naccache)....Pages 412-433
Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata (Ankit Pradhan, Kamalakanta Sethi, Shrohan Mohapatra, Padmalochan Bera)....Pages 434-456
Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map (Kyu Young Choi, Eunkyung Kim, Hyojin Yoon, Dukjae Moon, Jihoon Cho)....Pages 457-469
A t-out-of-n Redactable Signature Scheme (Masayuki Tezuka, Xiangyu Su, Keisuke Tanaka)....Pages 470-489
Front Matter ....Pages 491-491
A Framework with Randomized Encoding for a Fast Privacy Preserving Calculation of Non-linear Kernels for Machine Learning Applications in Precision Medicine (Ali Burak Ünal, Mete Akgün, Nico Pfeifer)....Pages 493-511
Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion (Yangguang Tian, Yingjiu Li, Binanda Sengupta, Nan Li, Yong Yu)....Pages 512-524
Implicit Related-Key Factorization Problem on the RSA Cryptosystem (Mengce Zheng, Honggang Hu)....Pages 525-537
Back Matter ....Pages 539-540
下载方式
购买后可查看 购买按钮在底部

常见问题

  • question_answer
    解压密码,提取码在哪?
    keyboard_arrow_down
    • 均在下载旁边哦,请注意查看,如果没有则是不需要密码
  • question_answer
    文件不符合描述怎么办?
    keyboard_arrow_down
    • 如果有文件问题,可以通过 卖家联系方式 联系卖家,如果 联系不上卖家 或 卖家无法解决则可以在我的订单页面申请售后
  • question_answer
    其他
    keyboard_arrow_down
    • 3.本文件为公益分享,文件由网上采集而来,如有侵权等问题,请及时联系客服删除
      常见问题及官方客服联系方式:点击前往
      售后问题处理方式:点击前往
-到底部了哦-
微信扫码支付
密码学与网络安全:第18届国际会议,CAN2019,中国福州,2019年10月25-27日,会议记录-Cryptology and Network Security: 18th Internation
支付金额: 共计:¥0.0

添加收藏

创建新合集