会议文集


文集名Computer Security - ESORICS 2023
会议名28th European Symposium on Research in Computer Security (ESORICS 2023)
中译名《第二十八届欧洲计算机安全研究专题研讨会,卷1》
会议日期September 25-29, 2023
会议地点The Hague, The Netherlands
出版年2024
馆藏号350876


题名作者出版年
A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise GrowthYavuz Akin; Jakub Klemsa; Melek Onen2024
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage ResilienceZhiyuan An; Haibo Tian; Chao Chen; Fangguo Zhang2024
Threshold Fully Homomorphic Encryption Over the TorusYukimasa Sugizaki; Hikaru Tsuchida; Takuya Hayashi; Koji Nuida; Akira Nakashima; Toshiyuki Isshiki; Kengo Mori2024
Revocable IBE with En-DKER from Lattices: A Novel Approach for Lattice Basis DelegationQi Wang; Haodong Huang; Juyan Li; Qi Yuan2024
Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPCAysajan Abidin; Erik Pohle; Bart Preneel2024
Code-Based Secret Handshake Scheme, RevisitedMinkyu Kim; Hyung Tae Lee2024
Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed LeakageFeng Li; Jianfeng Ma; Yinbin Miao; Pengfei Wu; Xiangfu Song2024
Password-Based Credentials with Security Against Server CompromiseDennis Dayanikli; Anja Lehmann2024
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group ElementsMarcel Tiepelt; Edward Eaton; Douglas Stebila2024
Commitments with Efficient Zero-Knowledge Arguments from Subset Sum ProblemsJules Maire; Damien Vergnaud2024
Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-AllocationsCarmen Wabartha; Julian Liedtke; Nicolas Huber; Daniel Rausch; Ralf Kusters2024
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and ImplementationRavi Anand; Subhadeep Banik; Andrea Caforio; Kazuhide Fukushima; Takanori Isobe; Shisaku Kiyomoto; Fukang Liu; Yuto Nakano; Kosei Sakamoto; Nobuyuki Takeuchi2024
Secure Outsourced Matrix Multiplication with Fully Homomorphic EncryptionLin Zhu; Qiang-sheng Hua; Yi Chen; Hai Jin2024
Sequential Half-Aggregation of Lattice-Based SignaturesKatharina Boudgoust; Akira Takahashi2024
Oblivious Extractors and Improved Security in Biometric-Based Authentication SystemsIvan De Oliveira Nunes; Peter Rindal; Maliheh Shirvanian2024
Optimally-Fair Multi-party Exchange Without Trusted PartiesIvo Maffei; A. W. Roscoe2024
Cheap and Fast Iterative Matrix Inverse in Encrypted DomainTae Min Ahn; Kang Hoon Lee; Joon Soo Yoo; Ji Won Yoon2024
Practical Randomized Lattice Gadget Decomposition with Application to FHESohyun Jeon; Hyang-Sook Lee; Jeongeun Park2024
Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWETheophile Brezot; Paola de Perthuis; David Pointcheval2024
Committed Private Information RetrievalQuang Cao; Hong Yen Tran; Son Hoang Dau; Xun Yi; Emanuele Viterbo; Chen Feng; Yu-Chih Huang; Jingge Zhu; Stanislav Kruglik; Han Mao Kiah2024
12