default search action
26th ACISP 2021: Virtual Event
- Joonsang Baek, Sushmita Ruj:
Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings. Lecture Notes in Computer Science 13083, Springer 2021, ISBN 978-3-030-90566-8
Cryptographic Foundations
- Sabyasachi Dutta, Reihaneh Safavi-Naini:
Leakage Resilient Cheating Detectable Secret Sharing Schemes. 3-23 - Tapas Pal, Ratna Dutta:
Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF. 24-45 - Behzad Abdolmaleki, Daniel Slamanig:
Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More. 46-67 - Steven D. Galbraith, Trey Li:
Small Superset and Big Subset Obfuscation. 68-87
Symmetric Primitives
- Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang:
Algebraic Attacks on Round-Reduced Keccak. 91-110 - Muhammad ElSheikh, Amr M. Youssef:
On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers. 111-131 - Xiaodan Li, Wenling Wu:
Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count. 132-150 - Yanhong Fan, Weijia Wang, Zhihu Li, Zhenyu Lu, Siu-Ming Yiu, Meiqin Wang:
Forced Independent Optimized Implementation of 4-Bit S-Box. 151-170 - Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto:
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V. 171-190
Encryption
- Xueqiao Liu, Kai He, Guomin Yang, Willy Susilo, Joseph Tonien, Qiong Huang:
Broadcast Authenticated Encryption with Keyword Search. 193-213 - Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehlé:
An Anonymous Trace-and-Revoke Broadcast Encryption Scheme. 214-233 - Takanori Isobe, Ryoma Ito:
Security Analysis of End-to-End Encryption for Zoom Meetings. 234-253 - Tapas Pal, Ratna Dutta:
CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption. 254-274
Privacy
- Thomas Haines, Johannes Müller:
Optimal Randomized Partial Checking for Decryption Mix Nets. 277-292 - Thomas Haines, Johannes Müller:
A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose. 293-308 - Hikaru Tsuchida, Takashi Nishide:
Private Decision Tree Evaluation with Constant Rounds via (Only) Fair SS-4PC. 309-329 - Geoffroy Couteau, A. W. Roscoe, Peter Y. A. Ryan:
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer. 330-349
Blockchain - Protocols and Foundations
- Yannan Li, Willy Susilo, Guomin Yang, Tran Viet Xuan Phuong, Yong Yu, Dongxi Liu:
Concise Mercurial Subvector Commitments: Definitions and Constructions. 353-371 - Yizhong Liu, Jianwei Liu, Yiming Hei, Yu Xia, Qianhong Wu:
A Secure Cross-Shard View-Change Protocol for Sharding Blockchains. 372-390 - Anh The Ta, Thanh Xuan Khuc, Tuong Ngoc Nguyen, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signature for Blockchain Privacy Protection. 391-407 - Zongyang Zhang, Tong Li, Zhuo Wang, Jianwei Liu:
Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE. 408-429
Blockchain - Analysis and Attack
- Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Transparency or Anonymity Leak: Monero Mining Pools Data Publication. 433-450 - Wei-Yang Chiu, Weizhi Meng:
Mind the Scraps: Attacking Blockchain Based on Selfdestruct. 451-469
Machine Learning for Privacy
- Minfeng Qi, Ziyuan Wang, Fan Wu, Rob Hanson, Shiping Chen, Yang Xiang, Liming Zhu:
A Blockchain-Enabled Federated Learning Model for Privacy Preservation: System Design. 473-489 - Jikun Chen, Ruoyu Deng, Hongbin Chen, Na Ruan, Yao Liu, Chao Liu, Chunhua Su:
ALRS: An Adversarial Noise Based Privacy-Preserving Data Sharing Mechanism. 490-509 - Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa:
Non-interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning. 510-528
Machine Learning - Analysis and Attack
- Wei Zong, Yang-Wai Chow, Willy Susilo:
Towards Visualizing and Detecting Audio Adversarial Examples for Automatic Speech Recognition. 531-549 - Liuqiao Chen, Hu Wang, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian:
Oriole: Thwarting Privacy Against Trustworthy Deep Learning Models. 550-568
Post Quantum Cryptography - Encryption
- Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Partha Sarathi Roy:
Puncturable Identity-Based Encryption from Lattices. 571-589 - Chao Liu, Anyu Wang, Zhongxiang Zheng:
Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-Based GSW-FHE. 590-609 - Jing Pan, Xiaofeng Chen, Fangguo Zhang, Willy Susilo:
Forward-Secure Group Encryptions from Lattices. 610-629 - Xavier Boyen, Ernest Foo, Qinyi Li:
Anonymous Lattice Identity-Based Encryption with Traceable Identities. 630-649
Post Quantum Cryptography - Authentication
- Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Joohee Lee, Junbum Shin, Yongsoo Song:
Lattice-Based Secure Biometric Authentication for Hamming Distance. 653-672 - Handong Cui, Tsz Hon Yuen:
A Trustless GQ Multi-signature Scheme with Identifiable Abort. 673-693 - Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver:
Verifiable Obtained Random Subsets for Improving SPHINCS+. 694-714
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.