The conference proceeding can be download at
https://link.springer.com/book/10.1007/978-3-031-20917-8.
Regular paper:
Identity-Based Proxy Re-encryption Based on SM9
Liu Hang, Ming Yang, Wang Chenhao and Yi Zhao
PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication
Hanyu Jia and Xiangxue Li
Clustered Federated Learning with Inference Hash Codes based Local Sensitive Hashing
Zhou Tan, Ximeng Liu, Yan Che and Yuyang Wang
Automatic Search of Linear Structure: Applications to Keccak and Ascon
Huina Li, Guozhen Liu, Haochen Zhang, Peng Tang and Weidong Qiu
Non-malleable Codes from Leakage Resilient Cryptographic Primitives
Anit Kumar Ghosal and Dipanwita Roy Chowdhury
MFL-RAT: Multi-class Few-shot Learning Method For Encrypted RAT Traffic Detection
Yijing Zhang, Jianhuan Zhuo, Jianjun Lin, Xiaoyu Liu, Weilin Gai, Xiaodu Yang, Yinliang Yue and Bo Sun
DroidSA: A slow-Aging Android Malware Detection Method Using API Clustering
Hongyu Yang, Youwei Wang, Liang Zhang, Ze Hu, Laiwei Jiang and Xiang Cheng
SecCDS: Secure Crowdsensing Data Sharing Scheme Supporting Aggressive Query
Yuxi Li, Fucai Zhou, Zifeng Xu and Dong Ji
Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption
Ming Liu, Mingyue Zhang, Guangshun Li, Tao Li and Yilei Wang
EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operation
Dong Chen, Zhiyuan Qiu and Guangwu Xu
Geometry-based Garbled Circuits Relying Solely on One Evaluation Algorithm under Standard Assumption
Jingyu Ning and Zhenhua Tan
A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement
Lixia Xie, Yange Li, Hongyu Yang, Peng Wang, Ze Hu, Xiang Cheng and Liang Zhang
TAElog: A Novel Transformer AutoEncoder-based Log Anomaly Detection Method
Changzhi Zhao, Kezhen Huang, Di Wu, Xueying Han, Dan Du, Yutian Zhou, Zhigang Lu and Yuling Liu
An Improved Method for Evaluating Secret Variables and Its Application to WAGE
Weizhe Wang, Haoyang Wang and Deng Tang
Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications
Shiyuan Xu, Yibo Cao, Xue Chen, Yanmin Zhao and Siu Ming Yiu
TVES: Threshold Verifiably Encrypted Signature and Its Applications
Chen Li, Haibo Tian and Fangguo Zhang
Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128
Zhichao Xu, Hong Xu, Lin Tan and Wenfeng Qi
A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy Preservation
Xuhao Li, Jiacheng Luo, Lu Zhou and Hao Wang
Improved Herrmann-May’s Attack with Merging Variables and Lower LLL Bound
Qingfeng Cheng, Chunzhi Zhao, Jinzheng Cao and Fushan Wei
Compact Accountable Ring Signatures in the Plain Model
Xuan Thanh Khuc, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima and Shinsaku Kiyomoto
Exploring Emotion Trends in Product Reviews: A Multi-modal Analysis with Malicious Comment Filtering and User Privacy Protection
Biyun Chen, Lin Jiang, Xin Pan, Guoquan Zhou and Aihua Sun
Full Domain Functional Bootstrapping with Least Significant Bit Encoding
Zhihao Li, Benqiang Wei, Ruida Wang, Xianhui Lu and Kunpeng Wang
TIA: Token Importance Transferable Attack on Vision Transformers
Tingchao Fu, Fanxiao Li, Jinhong Zhang, Liang Zhu, Yuanyu Wang and Wei Zhou
Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction
Guiquan Yang, Sha Ma, Hongbo Li, Husheng Yang and Qiong Huang
A Lightweight Access Control Scheme Supporting Policy Hidden based on Path Bloom Filter
Chao Luo, Jiaoli Shi, Lihua Wang, Minchen Xie, Zhuolin Mei, Chao Hu, Shimao Yao and Hui Li
Real-time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-plus Analysis
Zhen Yang, Jing Li, Fei Cui, Jia Qi Liu, Yu Cheng, Xi Nan Tang and Shuai Gui
CCA-secure Identity-Based Matchmaking Encryption from Standard Assumptions
Shen Lin, Yu Li and Jie Chen
Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
Chunping Zhu, Xingkai Wang and Zhen Liu
Improved Integral Cryptanalysis of Block Ciphers BORON and Khudra
Yi Guo, Danping Shi, Lei Hu and Yin Lv
Secure Multi-Party SM2 Signature based on SPDZ Protocol
Xiaotong Li, Hao Wang, Jiyang Chen, Shikuan Li, Yuxiang Sun and Ye Su
A General Federated Learning Scheme with Blockchain on non-IID Data
Hao Wu, Shengnan Zhao, Shan Jing and Chuan Zhao
General Constructions of Fuzzy Extractors for Continuous Sources
Yucheng Ma, Peisong Shen, Kewei Lv, Xue Tian and Chi Chen
Full Round Distinguishing and Key-Recovery Attacks on SAND-2
Zhuolong Zhang, Shiyao Chen, Wei Wang and Meiqin Wang
V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture
Qingguan Gao, Kaisheng Sun, Jiankuo Dong, Fangyu Zheng and Jingqiang Lin
Compact Ring Signatures with Post-Quantum Security in Standard Model
Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima and Shinsaku Kiyomoto
XPORAM: A Practical Multi-Client ORAM against Malicious Adversaries
Biao Gao, Shijie Jia, Jiankuo Dong and Peixin Ren
Text Laundering: Mitigating Malicious Features through Knowledge Distillation from Language Foundation Models
Yi Jiang, Chenghui Shi, Oubo Ma, Youliang Tian and Shouling Ji
Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber
Hang Yang, Rongmao Chen, Qiong Wang, Zixuan Wu and Wei Peng
Short paper:
DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection
Yinghui Zhang, Haorui Du, Jin Cao, Gang Han and Dong Zheng
A Practical Multi-Candidate Voting Protocol on Quantum Blockchain Adapted for Various Tally Principles
Xin Sun, Hui Chen, Anran Cui and Xingchi Su
Quantum Augmented Lattice Attack on NTRU with Side Information
Qingfeng Cheng, Jinzheng Cao and Xiangyang Luo
Quantum Attacks: A View of Data Complexity on Offline Simon’s Algorithm
Bo Yu, Tairong Shi, Xiaoyang Dong, Xuan Shen, Yiyuan Luo and Bing Sun
FaBFT: Flexible Asynchronous BFT Protocol Using DAG
Yu Song, Yu Long, Xian Xu and Dawu Gu
Forward Secure Online/offline Key Policy Attribute-based Encryption with Multi-keyword Search
Husheng Yang, Sha Ma, Pan Zhou, Guiquan Yang and Qiong Huang
Differential Privacy Enhanced Dynamic Searchable Symmetric Encryption for Cloud Environments
Peiyi Tu and Xingjun Wang
Poster:
An Efficient Privacy-preserving Scheme for Weak Password Collection in Internet of Things
Changsong Jiang, Chunxiang Xu and Kefei Chen
TRGE: A Backdoor Detection after Quantization
Renhua Xie, Xuxin Fang, Bo Ma and Chuanhuang Li
Improved Homomorphic Evaluation for Hash Function based on TFHE
Benqiang Wei and Xianhui Lu
Lightweight Instance Batch Schemes towards Prover-efficient Decentralized Private Computation
Ziyu Meng, Zibo Zhou, Zongyang Zhang and Yu Jin
Power of Randomness Recovery: Tightly CCA-Secure KEM in the QROM
Ziyi Li, Xianhui Lu, Yao Cheng and Bao Li
Partial Key Exposure Attack on Common Prime RSA
Mengce Zheng
Key Consortium Attribute-Based Encryption
Luqi Huang, Willy Susilo, Guomin Yang, Wenchao Li and Fuchun Guo
An Efficient Autonomous Path Proxy Re-Encryption without Pairing for Cloud-assisted mHealth
Linghui Chen, Zhiguo Wan, Jun Zhou and Ivan Edmar Carvajal-Roca