Provable and Practical Security - Liu, Joseph K.; Chen, Liqun; Sun, Shi-Feng;(ed.) - Prospero Internet Bookshop

Provable and Practical Security: 18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25?27, 2024, Proceedings, Part I
 
Product details:

ISBN13:9789819609536
ISBN10:9819609534
Binding:Paperback
No. of pages:305 pages
Size:235x155 mm
Language:English
Illustrations: 44 Illustrations, black & white
700
Category:

Provable and Practical Security

18th International Conference, ProvSec 2024, Gold Coast, QLD, Australia, September 25?27, 2024, Proceedings, Part I
 
Publisher: Springer
Date of Publication:
Number of Volumes: 1 pieces, Book
 
Normal price:

Publisher's listprice:
EUR 70.61
Estimated price in HUF:
30 694 HUF (29 232 HUF + 5% VAT)
Why estimated?
 
Your price:

24 555 (23 386 HUF + 5% VAT )
discount is: 20% (approx 6 139 HUF off)
Discount is valid until: 31 December 2024
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

Not yet published.
 
  Piece(s)

 
Long description:

This book constitutes the proceedings of the 18th International Conference on Provable and Practical Security, ProvSec 2024, which took place in Gold Coast, QLD, Australia, during September 25-27, 2024. 



The 26 full papers  and 8 short papers presented were thoroughly reviewed and selected from the 79 submissions. The papers are organized in the following topical sections: 



Part I: Multi-Party Computation; Searchable Encryption; Encryption and Signature.



Part II : Tight Security; Quantum-Safe Cryptography; Distributed System and Blockchain Security; and Key Exchange and Privacy

Table of Contents:

.- Multi-Party Computation.



.- SecFloatPlus: More Accurate Floating-Point Meets Secure Two-Party Computation.



.- Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings.



.- Secure Five-party Computation with Private Robustness and Minimal Online Communication.



.- Model Extraction Attack on MPC Hardened Vertical Federated Learning.



.- Searchable Encryption.



.- Verifiable Conjunctive Searchable Symmetric Encryption with Result Pattern Hiding.



.- Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption with Optimized Storage.



.- Encryption.



.- PPA-DCA: A Privacy-Preserving and Accountable Data Collection and Analysis Scheme Using Decentralized Multi-Client Functional Encryption.



.- Ideal Public Key Encryption, Revisited.



.- Simple Construction of PEKS from LWE-based IBE in the Standard Model.



.- Signature.



.- Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions.



.- Tightly Secure Identity-based Signature from Cryptographic Group Actions.



.- Generic Construction of Withdrawable Signature from Hash-ThenOne-Way Signature.



.- Efficient Fork-Free BLS Multi-Signature Scheme with Incremental Signing.



.- Threshold Ring Signatures: From DualRing to the t+1 Rings.



.- Lattice-Based Non-Interactive Blind Signature Schemes in the Random Oracle Model.