Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part I / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu
| Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part I / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu |
| Autore | Liu Joseph K |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (592 pages) |
| Disciplina | 005.824 |
| Altri autori (Persone) |
ChenLiqun
SunShi-Feng LiuXiaoning |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Computer networks - Security measures Application software Cryptology Computer Communication Networks Mobile and Network Security Computer and Information Systems Applications |
| ISBN |
9789819609543
9819609542 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Multi-Party Computation. -- SecFloatPlus: More Accurate Floating-Point Meets Secure Two-Party Computation. -- Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings. -- Secure Five-party Computation with Private Robustness and Minimal Online Communication. -- Model Extraction Attack on MPC Hardened Vertical Federated Learning. -- Searchable Encryption. -- Verifiable Conjunctive Searchable Symmetric Encryption with Result Pattern Hiding. -- Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption with Optimized Storage. -- Encryption. -- PPA-DCA: A Privacy-Preserving and Accountable Data Collection and Analysis Scheme Using Decentralized Multi-Client Functional Encryption. -- Ideal Public Key Encryption, Revisited. -- Simple Construction of PEKS from LWE-based IBE in the Standard Model. -- Signature. -- Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions. -- Tightly Secure Identity-based Signature from Cryptographic Group Actions. -- Generic Construction of Withdrawable Signature from Hash-ThenOne-Way Signature. -- Efficient Fork-Free BLS Multi-Signature Scheme with Incremental Signing. -- Threshold Ring Signatures: From DualRing to the t+1 Rings. -- Lattice-Based Non-Interactive Blind Signature Schemes in the Random Oracle Model. |
| Record Nr. | UNINA-9910983330103321 |
Liu Joseph K
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part I / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu
| Provable and Practical Security : 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25–27, 2024, Proceedings, Part I / / edited by Joseph K. Liu, Liqun Chen, Shi-Feng Sun, Xiaoning Liu |
| Autore | Liu Joseph K |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (592 pages) |
| Disciplina | 005.824 |
| Altri autori (Persone) |
ChenLiqun
SunShi-Feng LiuXiaoning |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Computer networks - Security measures Application software Cryptology Computer Communication Networks Mobile and Network Security Computer and Information Systems Applications |
| ISBN |
9789819609543
9819609542 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Multi-Party Computation. -- SecFloatPlus: More Accurate Floating-Point Meets Secure Two-Party Computation. -- Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings. -- Secure Five-party Computation with Private Robustness and Minimal Online Communication. -- Model Extraction Attack on MPC Hardened Vertical Federated Learning. -- Searchable Encryption. -- Verifiable Conjunctive Searchable Symmetric Encryption with Result Pattern Hiding. -- Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption with Optimized Storage. -- Encryption. -- PPA-DCA: A Privacy-Preserving and Accountable Data Collection and Analysis Scheme Using Decentralized Multi-Client Functional Encryption. -- Ideal Public Key Encryption, Revisited. -- Simple Construction of PEKS from LWE-based IBE in the Standard Model. -- Signature. -- Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions. -- Tightly Secure Identity-based Signature from Cryptographic Group Actions. -- Generic Construction of Withdrawable Signature from Hash-ThenOne-Way Signature. -- Efficient Fork-Free BLS Multi-Signature Scheme with Incremental Signing. -- Threshold Ring Signatures: From DualRing to the t+1 Rings. -- Lattice-Based Non-Interactive Blind Signature Schemes in the Random Oracle Model. |
| Record Nr. | UNISA-996647867803316 |
Liu Joseph K
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||