ISBN13: | 9789819609567 |
ISBN10: | 9819609569 |
Binding: | Paperback |
No. of pages: | 295 pages |
Size: | 235x155 mm |
Language: | English |
Illustrations: | 45 Illustrations, black & white |
700 |
Provable and Practical Security
EUR 62.05
Click here to subscribe.
This book constitutes the proceedings of the 18th International Conference on Provable and Practical Security, ProvSec 2024, which took place in Gold Coast, QLD, Australia, during September 25-27, 2024.
The 26 full papers and 8 short papers presented were thoroughly reviewed and selected from the 79 submissions. The papers are organized in the following topical sections:
Part I: Multi-Party Computation; Searchable Encryption; Encryption and Signature.
Part II : Tight Security; Quantum-Safe Cryptography; Distributed System and Blockchain Security; and Key Exchange and Privacy
.- Tight Security.
.- Efficient Variants of TNT with BBB Security.
.- ROM Reduction Failures: Reasons and Solutions.
.- Quantum-Safe Cryptography.
.- BDEC: Enhancing Learning Credibility via Post-Quantum Digital Credentials.
.- Semi-Compressed CRYSTALS-Kyber.
.- Blocklistable Anonymous Credential for Circuits with Post-Quantum Security.
.- Distributed System and Blockchain Security.
.- Asynchronous Byzantine Fault Tolerance Reliable Broadcast Based on Directed Acyclic Graph.
.- PDTS: Practical Data Trading Scheme in Distributed Environments.
.- Communication-Efficient Secure Neural Network via Key-Reduced Distributed Comparison Function.
.- Enabling Efficient Cross-Shard Smart Contract Calling via Overlapping.
.- Key Exchange and Privacy.
.- Subversion-Resilient Authenticated Key Exchange with Reverse Firewalls.
.- On Sealed-bid Combinatorial Auction with Privacy-Preserving Dynamic Programming.
.- Short Papers.
.- SePEnTra: A secure and privacy-preserving energy trading mechanism in the transactive energy market.
.- On Multi-user Security of Lattice-based Signature under Adaptive Corruptions and Key Leakages.
.- Reusable Fuzzy Extractor from Isogeny.
.- Ensuring Fair Data Trading via Passive Proxy Re-encryption with Smart Contracts.
.- DPAC: A New Data-centric Privacy-preserving Access Control Model.
.- Improving the Accuracy of Transaction-Based Ponzi Detection on Ethereum.
.- A2V: Anonymous and Accountable Voting Framework via Blockchain.
.- Quantum Safe Computation-friendly Identity-binding Password Authenticated Key Exchange.