3: SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature between PKI and IBC
Yibing Wang, Xiaoxiao Wang, Chin-Tser Huang, Dejun Wang, Binhao Ma and Bo Meng
South-Central Minzu University, WuHan, China, University of South Carolina, South Carolina, USA
5: Privacy Preserving Outsourced K-means Clustering using Kd-tree
Yanxiang Deng, Lin Liu, Shaojing Fu, Yuchuan Luo, Wei Wu and Shixiong Wang
College of Computer, National University of Defense Technology,Academy of Military Sciences
6: Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency
Zehui Tang, Shengke Zeng, Tao Li, Shuai Cheng and Haoyu Zheng
School of Computer and Software Engineering, Xihua University,Chengdu 610039, China,State Key Laboratory of Public Big Data, College of Computer Science and Technology,Guizhou University, Guiyang 550025, China,School of Computer Science, Qufu Normal University, Rizhao 276825, China
7: Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications
Masahito Ishizaka
KDDI Research, Inc., Saitama, Japan
19: Efficient Zero-Knowledge Arguments for Matrix Relations over Rings and Non-malleable Enhancement
Yuan Tian, Xinke Tian and Yongda Pang
Software School, Dalian University of Technology, Dalian, Liao Ning, P.R.China
22: A Privacy-Preserving Takeaway Delivery Service Scheme
Lang Xu, Jiqiang Li, Hao Zhang and Hua Shen
Hubei University of Technology, Wuhan, Hubei, 430068, China
23: Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation
Fuhu Wu, Lin Wang, Shun Zhang, Jie Cui, and Hong Zhong
School of Computer Science and Technology, Anhui University, Hefei 230601, China
26: CDRF: A Detection Method of Smart Contract Vulnerability Based on Random Forest
Meng Huang, Jia Yang and Cong Liu
Hubei University of Technology, Wuhan 430068, China, Hubei University of Technology, Wuhan 430068, China
28: Improved Key-Recovery Attacks under Imperfect SCA Oracle for Lattice-based KEMs
Wenhao Shi, Jiang Han, Haodong Jiang and Zhi Ma
Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, TCA of State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences
35: A certificateless aggregate signature scheme with better security
Ran Xu, Yanwei Zhou, Yu Han and Bo Yang
School of Computer Science, Shaanxi Normal University
36: Constant-size Group Signatures with Message-Dependent Opening from Lattices
Simin Chen, Jiageng Chen, Atsuko Miyaji and Kaiming Chen
School of Computer Science, Central China Normal University, China, Graduate School of Engineering, Osaka University, Japan
37 :Homomorphic Witness Encryption from Indistinguishable Obfuscation
Yuzhu Wang, Xingbo Wang and Mingwu Zhang
School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, 541004 China, School of Computer Science, Hubei University of Technology, Wuhan, 430068 China
38: FleS: a compact and parameter-flexible supersingular isogeny based public key encryption scheme
Weihan Huang, Min Luo, Cong Peng and Debiao He
Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China
46: Post-quantum Sigma Protocols and Signatures from Low-Rank Matrix Completions
Jiaming Wen, Houzhen Wang and Huanguo Zhang
Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
49: simuBits: PoolSecurity Verification of Novel Mining Attacks
Zhou Zunlong, Chen Wen, Li Linrui and Zhang Yilin
School of Cyber Science and Engineering, Sichuan University, Chengdu, 610065, China
50: Identity-based Matchmaking Encryption Secure against Key Generation Center
Sohto Chiku, Keisuke Hara and Junji Shikata
Yokohama National University, Japan, National Institute of Advanced Industrial Science and Technology, Japan
53: Signcryption-based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections
Hao Zhu, Fagen Li, Lihui Liu, Yong Zeng, Xiaoli Li and Jianfeng Ma
School of Cyber Engineering, Xidian University, Xi’an 710071, China, School of Computer Science and Engineering, University of Electronic Science and Technology, Chengdu 611731, China, WuHan Marine Communication Research Institute, Wuhan 430000, China
55: Multi-Input Functional Encryption for Unbounded Inner Products
Bishnu Charan Behera and Somindu C. Ramanna
Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, India
59: A New Revocable Attribute Based Encryption on Lattice
Lifeng Guo, Lingxia Wang, Xueke Ma and Qianli Ma
School of Computer and Information Technology, Shanxi University, Taiyuan, China
61: Linear Cryptanalysis of Lightweight Block Cipher WARP
Hong Xu, Chunyu Hao, Zhichao Xu and Wenfeng Qi
Information Engineering University, Zhengzhou, China
66: An efficient keyword-based ciphertext retrieval scheme
Zihao Liu, Ruixuan Deng, Chongxi Guan and Hua Shen
Hubei University of Technology
72: Threshold Ring Signature Scheme from Cryptographic Group Action
Minh Thuy Truc Pham, Dung Hoang Duong, Yannan Li and Willy Susilo
Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of WollongongNorthfields Avenue, Wollongong NSW 2522, Australia
74: Linicrypt in the Ideal Cipher Model
Zahra Javar and Bruce Kapron
University of Victoria, Victoria, BC, CANADA