Information Security and Cryptology
19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part I
Book and Conference Proceedings
19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part I
Book and Conference Proceedings
19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part II
Article
Smart contracts are slowly penetrating our society where they are leveraged to support critical business transactions of which financial stakes are high. Smart contract programming is, however, in its infancy,...
Chapter and Conference Paper
As the most popular consensus algorithm for blockchain, the Proof-of-Work (PoW) is suffering from the inability of handling computing power fluctuations. Meanwhile, PoW consumes a significant amount of energy ...
Chapter and Conference Paper
Privacy-preserving machine learning is a hot topic in Artificial Intelligence (AI) area. However, there are also many security issues in all stages of privacy-oriented machine learning. This paper focuses on t...
Chapter and Conference Paper
Smart contracts, that allow parties to establish agreements based on predefined rules without a trusted third-party, have been explored in various applications. However, the main drawback of smart contracts is...
Book and Conference Proceedings
16th International Conference, ProvSec 2022, Nan**g, China, November 11–12, 2022, Proceedings
Article
Shor presented a quantum algorithm to factor large integers and compute discrete logarithms in polynomial time. As a result, public key cryptosystems, such as RSA, ElGamal and ECC, which are based on these com...
Chapter and Conference Paper
The Lightning Network is a payment channel network that runs on top of Bitcoin. It is an open network, in which anyone with a computing device capable of connecting to the Internet can participate. Every parti...
Chapter and Conference Paper
Software validation is a long battle between software developers and software pirates. License validation is proposed as the protection of both developer’s revenue and intellectual properties. However, as the ...
Article
Blockchain, the underlying technology of the Bitcoin cryptocurrency, is an innovation of information technology. The blockchain technology has been widely applied in the evidence storage scenarios to prove tha...
Article
Article
In the Bitcoin network, the simplified payment verification protocol (SPV) enables a lightweight device such as a mobile phone to participate in the bitcoin network without needed to download and store the who...
Chapter and Conference Paper
Micro-video sharing is prevalent nowadays due to the rapid development of personal smart devices, fast growing of network bandwidth and the easy-to-use cloud computing. However, the micro-video sharing system ...
Chapter and Conference Paper
With the rapid growth of the transportation systems, the Internet of Vehicles (IoV) has evolved as a new theme in both industry and academia from traditional vehicular ad hoc networks (VANETs). However, the mu...
Article
The notion of attribute-based proxy re-encryption extends the traditional proxy re-encryption to the attribute-based setting. In an attribute-based proxy re-encryption scheme, the proxy can convert a ciphertex...
Article
Proxy re-encryption (PRE) enables a semi-trusted proxy to automatically convert a delegator’s ciphertext to a delegate’s ciphertext without learning anything about the underlying plaintext. PRE schemes have br...
Article
Weng et al. introduced the notion of conditional proxy re-encryption (C-PRE), whereby only the ciphertext satisfying one condition set by Alice can be re-encrypted by the proxy. To achieve more fine-grained de...
Chapter and Conference Paper
The public key encryption with keyword Search (PEKS) scheme, proposed by Boneh, Di Crescenzo, Ostrovsky and Persiano, enables one to search for encrypted keywords without compromising the security of the origi...