


default search action
18th ProvSec 2024: Gold Coast, QLD, Australia - Part II
- Joseph K. Liu, Liqun Chen
, Shi-Feng Sun, Xiaoning Liu:
Provable and Practical Security - 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25-27, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14904, Springer 2025, ISBN 978-981-96-0956-7
Tight Security
- Ritam Bhaumik
, Wonseok Choi
, Avijit Dutta
, Cuauhtemoc Mancillas López
, Hrithik Nandi
, Yaobin Shen:
Efficient Variants of TNT with BBB Security. 3-22 - Ziyi Li, Xianhui Lu, Yao Cheng:
ROM Reduction Failures: Reasons and Solutions. 23-42
Quantum-Safe Cryptography
- Zoey Ziyi Li
, Xinyu Zhang
, Hui Cui
, Jun Zhao
, Xuan Chen
:
BDEC: Enhancing Learning Credibility via Post-quantum Digital Credentials. 45-64 - Shuiyin Liu
, Amin Sakzad
:
Semi-compressed CRYSTALS-Kyber. 65-82 - Zuoxia Yu
, Rupeng Yang
, Willy Susilo
, Man Ho Au
:
Blocklistable Anonymous Credential for Circuits with Post-quantum Security. 83-105
Distributed System and Blockchain Security
- Haibo Tian, Jiajun Chen:
Asynchronous Byzantine Fault Tolerance Reliable Broadcast Based on Directed Acyclic Graph. 109-123 - Kun Wang, Qianhong Wu, Tianxu Han, Sipeng Xie, Qin Wang, Yingmiao Zhang, Bo Qin, Xiaopeng Dai:
PDTS: Practical Data Trading Scheme in Distributed Environments. 124-142 - Peng Yang, Zoe Lin Jiang, Shiqi Gao, Hongxiao Wang, Jun Zhou, Yangyiye Jin, Siu-Ming Yiu, Junbin Fang:
Communication-Efficient Secure Neural Network via Key-Reduced Distributed Comparison Function. 143-163 - Zixu Zhang
, Hongbo Yin
, Ying Wang
, Guangsheng Yu
, Xu Wang
, Wei Ni
, Ren Ping Liu
:
Enabling Efficient Cross-Shard Smart Contract Calling via Overlapping. 164-178
Key Exchange and Privacy
- Jiahao Liu, Rongmao Chen, Yi Wang, Xincheng Tang, Jinshu Su:
Subversion-Resilient Authenticated Key Exchange with Reverse Firewalls. 181-200 - Hong-Yen Tran, Jiankun Hu, Shabnam Kasra Kermanshahi:
On Sealed-Bid Combinatorial Auction with Privacy-Preserving Dynamic Programming. 201-220
Short Papers
- Rumpa Dasgupta, Amin Sakzad, Carsten Rudolph, Rafael Dowsley:
SePEnTra: A Secure and Privacy-Preserving Energy Trading Mechanism in the Transactive Energy Market. 223-235 - Masayuki Fukumitsu
, Shingo Hasegawa
:
On Multi-User Security of Lattice-Based Signature Under Adaptive Corruptions and Key Leakages. 236-245 - Yu Zhou
, Shengli Liu
, Shuai Han
:
Reusable Fuzzy Extractor from Isogeny. 246-256 - Peng Zhang, Jiaquan Wei, Yuhong Liu, Jianzhou Ruan, Hui Cui:
Ensuring Fair Data Trading via Passive Proxy Re-encryption with Smart Contracts. 257-266 - Xu Wang
, Baihe Ma
, Ren Ping Liu
, Ian J. Oppermann
:
DPAC: A New Data-Centric Privacy-Preserving Access Control Model. 267-276 - Phuong Duy Huynh
, Son Hoang Dau
, Xiaodong Li
, Phuc Luong
, Emanuele Viterbo
:
Improving the Accuracy of Transaction-Based Ponzi Detection on Ethereum. 277-287 - Zhimei Sui, Liangrong Zhao:
A2V: Anonymous and Accountable Voting Framework via Blockchain. 288-297 - Pratima Jana, Ratna Dutta, Cong Zuo:
Quantum Safe Computation-Friendly Identity-Binding Password Authenticated Key Exchange. 298-309

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.