Abstract is missing.
- TVES: Threshold Verifiably Encrypted Signature and Its ApplicationsChen Li, Haibo Tian, Fangguo Zhang. 3-22 [doi]
- Compact Accountable Ring Signatures in the Plain ModelThanh Xuan Khuc, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto. 23-43 [doi]
- Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public KeyChunping Zhu, Xingkai Wang, Zhen Liu 0008. 44-64 [doi]
- Compact Ring Signatures with Post-Quantum Security in Standard ModelTuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto. 65-84 [doi]
- Secure Multi-party SM2 Signature Based on SPDZ ProtocolXiaotong Li, Hao Wang, Jiyang Chen, Shikuan Li, Yuxiang Sun, Ye Su. 85-103 [doi]
- Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path EncryptionMing Liu, Mingyue Zhang, Guangshun Li, Yuemei Hu, Tao Li, Yilei Wang, Bo Lan. 107-125 [doi]
- A General Federated Learning Scheme with Blockchain on Non-IID DataHao Wu, Shengnan Zhao, Chuan Zhao, Shan Jing. 126-140 [doi]
- A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy PreservationXuhao Li, Jiacheng Luo, Lu Zhou, Hao Wang. 141-159 [doi]
- General Constructions of Fuzzy Extractors for Continuous SourcesYucheng Ma, Peisong Shen, Kewei Lv, Xue Tian, Chi Chen 0001. 163-182 [doi]
- Geometry-Based Garbled Circuits Relying Solely on One Evaluation Algorithm Under Standard AssumptionJingyu Ning, Zhenhua Tan. 183-202 [doi]
- Full Domain Functional Bootstrapping with Least Significant Bit EncodingZhihao Li, Benqiang Wei, Ruida Wang, Xianhui Lu, Kunpeng Wang. 203-223 [doi]
- PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity CommunicationHanyu Jia, Xiangxue Li. 227-252 [doi]
- CCA-Secure Identity-Based Matchmaking Encryption from Standard AssumptionsShen Lin, Yu Li, Jie Chen 0021. 253-273 [doi]
- Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and ApplicationsShiyuan Xu, Yibo Cao, Xue Chen, Yanmin Zhao, Siu-Ming Yiu. 274-298 [doi]
- Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword ConstructionGuiquan Yang, Sha Ma, Hongbo Li 0004, Husheng Yang, Qiong Huang 0001. 299-319 [doi]
- Identity-Based Proxy Re-encryption Based on SM9Hang Liu, Yang Ming 0001, Chenhao Wang, Yi Zhao. 320-339 [doi]
- SecCDS: Secure Crowdsensing Data Sharing Scheme Supporting Aggregate QueryYuxi Li, Fucai Zhou, Zifeng Xu, Dong Ji. 343-359 [doi]
- An Improved Method for Evaluating Secret Variables and Its Application to WAGEWeizhe Wang, Haoyang Wang, Deng Tang. 360-378 [doi]
- Exploring Emotion Trends in Product Reviews: A Multi-modal Analysis with Malicious Comment Filtering and User Privacy ProtectionBiyun Chen, Lin Jiang, Xin Pan, Guoquan Zhou, Aihua Sun, Dafang Li. 379-396 [doi]
- XPORAM: A Practical Multi-client ORAM Against Malicious AdversariesBiao Gao, Shijie Jia 0001, Jiankuo Dong, Peixin Ren. 397-417 [doi]
- A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data EnhancementLixia Xie, Yange Li, Hongyu Yang, Peng Wang, Ze Hu, Xiang Cheng, Liang Zhang 0018. 418-432 [doi]
- A Lightweight Access Control Scheme Supporting Policy Hidden Based on Path Bloom FilterChao Luo, Jiaoli Shi, Minchen Xie, Chao Hu, Lihua Wang, Zhuolin Mei, Shimao Yao, Hui Li 0022. 433-451 [doi]
- MFL-RAT: Multi-class Few-Shot Learning Method for Encrypted RAT Traffic DetectionYijing Zhang, Jianhuan Zhuo, Jianjun Lin, Xiaoyu Liu, Weilin Gai, Xiaodu Yang, Yinliang Yue, Bo Sun. 452-471 [doi]