My Account Log in

1 option

Provable and Practical Security : 17th International Conference, ProvSec 2023, Wuhan, China, October 20–22, 2023, Proceedings / edited by Mingwu Zhang, Man Ho Au, Yudi Zhang.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Author/Creator:
Zhang, Mingwu.
Contributor:
Au, Man-Ho.
Zhang, Yudi.
Series:
Lecture Notes in Computer Science, 1611-3349 ; 14217
Language:
English
Subjects (All):
Cryptography.
Data encryption (Computer science).
Computer networks.
Computer networks--Security measures.
Application software.
Cryptology.
Computer Communication Networks.
Mobile and Network Security.
Computer and Information Systems Applications.
Local Subjects:
Cryptology.
Computer Communication Networks.
Mobile and Network Security.
Computer and Information Systems Applications.
Physical Description:
1 online resource (450 pages)
Edition:
1st ed. 2023.
Place of Publication:
Cham : Springer Nature Switzerland : Imprint: Springer, 2023.
Summary:
This volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023, held in Wuhan, China, during October 2023. The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.
Contents:
Fundamentals & Cryptographic Primitives
Efficient Zero-Knowledge Arguments for Matrix Relations over Rings and Non-malleable Enhancement
Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation
Signcryption-based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections
Cryptanalysis
Improved Key-Recovery Attacks under Imperfect SCA Oracle for Latticebased KEMs
Linear Cryptanalysis of Lightweight Block Cipher WARP
Linicrypt in the Ideal Cipher Model
Signature
SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature between PKI and IBC
Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications
A Certificateless Aggregate Signature Scheme with Better Security
Constant-size Group Signatures with Message-Dependent Opening from Lattices
Post-quantum SigmaProtocols and Signatures from Low-Rank Matrix Completions
Threshold Ring Signature Scheme from Cryptographic Group Action
Encryption
Homomorphic Witness Encryption from Indistinguishable Obfuscation
Identity-based Matchmaking Encryption Secure against Key Generation Center
Multi-Input Functional Encryption for Unbounded Inner Products
FleS: a compact and parameter-flexible supersingular isogeny based public key encryption scheme
A New Revocable Attribute Based Encryption on Lattice
An efficient keyword-based ciphertext retrieval scheme
Privacy Preservation
Privacy Preserving Outsourced K-means Clustering using Kd-tree
Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency
A Privacy-Preserving Takeaway Delivery Service Scheme
Blockchain Security
CDRF: A Detection Method of Smart Contract Vulnerability Based on Random Forest
simuBits: Pool Security Verification of Novel Mining Attacks.
ISBN:
9783031455131
3031455134
OCLC:
1404449212

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account