Search dblp for Publications

export results for "toc:db/conf/cans/cans2019.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cans/ChenC19,
  author       = {Lanxiang Chen and
                  Zhenchao Chen},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Practical, Dynamic and Efficient Integrity Verification for Symmetric
                  Searchable Encryption},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {163--183},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_9},
  doi          = {10.1007/978-3-030-31578-8\_9},
  timestamp    = {Thu, 17 Mar 2022 14:41:28 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/ChenC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ChenLW0X19,
  author       = {Kai Chen and
                  Zhongrui Lin and
                  Jian Wan and
                  Lei Xu and
                  Chungen Xu},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Multi-owner Secure Encrypted Search Using Searching Adversarial Networks},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {184--195},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_10},
  doi          = {10.1007/978-3-030-31578-8\_10},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/ChenLW0X19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ChengYYM19,
  author       = {Yuting Cheng and
                  Li Yang and
                  Shui Yu and
                  Jianfeng Ma},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Achieving Efficient and Verifiable Assured Deletion for Outsourced
                  Data Based on Access Right Revocation},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {392--411},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_22},
  doi          = {10.1007/978-3-030-31578-8\_22},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/ChengYYM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ChoiKYMC19,
  author       = {Kyu Young Choi and
                  Eunkyung Kim and
                  Hyo Jin Yoon and
                  Dukjae Moon and
                  Jihoon Cho},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Generic Construction of Bounded-Collusion {IBE} via Table-Based ID-to-Key
                  Map},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {457--469},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_25},
  doi          = {10.1007/978-3-030-31578-8\_25},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/ChoiKYMC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/DattaJF19,
  author       = {Amit Datta and
                  Marc Joye and
                  Nadia Fawaz},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Private Data Aggregation over Selected Subsets of Users},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {375--391},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_21},
  doi          = {10.1007/978-3-030-31578-8\_21},
  timestamp    = {Fri, 11 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/DattaJF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/DesmedtDM19,
  author       = {Yvo Desmedt and
                  Sabyasachi Dutta and
                  Kirill Morozov},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Evolving Perfect Hash Families: {A} Combinatorial Viewpoint of Evolving
                  Secret Sharing},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {291--307},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_16},
  doi          = {10.1007/978-3-030-31578-8\_16},
  timestamp    = {Fri, 11 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/DesmedtDM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/FerradiN19,
  author       = {Houda Ferradi and
                  David Naccache},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Integer Reconstruction Public-Key Encryption},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {412--433},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_23},
  doi          = {10.1007/978-3-030-31578-8\_23},
  timestamp    = {Fri, 11 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/FerradiN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/GavinB19,
  author       = {G{\'{e}}rald Gavin and
                  St{\'{e}}phane Bonnevay},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Fractional {LWE:} {A} Nonlinear Variant of {LWE}},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {360--371},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_20},
  doi          = {10.1007/978-3-030-31578-8\_20},
  timestamp    = {Fri, 11 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/GavinB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/HabockK19,
  author       = {Ulrich Hab{\"{o}}ck and
                  Stephan Krenn},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Breaking and Fixing Anonymous Credentials for the Cloud},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {249--269},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_14},
  doi          = {10.1007/978-3-030-31578-8\_14},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/HabockK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/IzabacheneSZ19,
  author       = {Malika Izabach{\`{e}}ne and
                  Renaud Sirdey and
                  Martin Zuber},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Practical Fully Homomorphic Encryption for Fully Masked Neural Networks},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {24--36},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_2},
  doi          = {10.1007/978-3-030-31578-8\_2},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/IzabacheneSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KhatibAK19,
  author       = {Rami El Khatib and
                  Reza Azarderakhsh and
                  Mehran Mozaffari Kermani},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Optimized Algorithms and Architectures for Montgomery Multiplication
                  for Post-quantum Cryptography},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {83--98},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_5},
  doi          = {10.1007/978-3-030-31578-8\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/KhatibAK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/LinLWZ19,
  author       = {Fuchun Lin and
                  San Ling and
                  Huaxiong Wang and
                  Neng Zeng},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Threshold Changeable Ramp Secret Sharing},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {308--327},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_17},
  doi          = {10.1007/978-3-030-31578-8\_17},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/LinLWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/MoritaA19,
  author       = {Hiraku Morita and
                  Nuttapong Attrapadung},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Client-Aided Two-Party Secure Interval Test Protocol},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {328--343},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_18},
  doi          = {10.1007/978-3-030-31578-8\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/MoritaA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/PradhanSMB19,
  author       = {Ankit Pradhan and
                  Kamalakanta Sethi and
                  Shrohan Mohapatra and
                  Padmalochan Bera},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Distributed Multi-authority Attribute-Based Encryption Using Cellular
                  Automata},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {434--456},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_24},
  doi          = {10.1007/978-3-030-31578-8\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/PradhanSMB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/RatheeSS19,
  author       = {Deevashwer Rathee and
                  Thomas Schneider and
                  K. K. Shukla},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Improved Multiplication Triple Generation over Rings via RLWE-Based
                  {AHE}},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {347--359},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_19},
  doi          = {10.1007/978-3-030-31578-8\_19},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/RatheeSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SehrawatD19,
  author       = {Vipin Singh Sehrawat and
                  Yvo Desmedt},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_1},
  doi          = {10.1007/978-3-030-31578-8\_1},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/SehrawatD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SeoJA19,
  author       = {Hwajeong Seo and
                  Amir Jalali and
                  Reza Azarderakhsh},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {{SIKE} Round 2 Speed Record on {ARM} Cortex-M4},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {39--60},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_3},
  doi          = {10.1007/978-3-030-31578-8\_3},
  timestamp    = {Fri, 11 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/SeoJA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/TezukaST19,
  author       = {Masayuki Tezuka and
                  Xiangyu Su and
                  Keisuke Tanaka},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {A t-out-of-n Redactable Signature Scheme},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {470--489},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_26},
  doi          = {10.1007/978-3-030-31578-8\_26},
  timestamp    = {Fri, 11 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/TezukaST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/TianLSL019,
  author       = {Yangguang Tian and
                  Yingjiu Li and
                  Binanda Sengupta and
                  Nan Li and
                  Yong Yu},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Anonymous Asynchronous Payment Channel from k-Time Accountable Assertion},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {512--524},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_28},
  doi          = {10.1007/978-3-030-31578-8\_28},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/TianLSL019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/UnalAP19,
  author       = {Ali Burak {\"{U}}nal and
                  Mete Akg{\"{u}}n and
                  Nico Pfeifer},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {A Framework with Randomized Encoding for a Fast Privacy Preserving
                  Calculation of Non-linear Kernels for Machine Learning Applications
                  in Precision Medicine},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {493--511},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_27},
  doi          = {10.1007/978-3-030-31578-8\_27},
  timestamp    = {Fri, 11 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/UnalAP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/WangZHWL19,
  author       = {Shixiong Wang and
                  Juanyang Zhang and
                  Jingnan He and
                  Huaxiong Wang and
                  Chao Li},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Simplified Revocable Hierarchical Identity-Based Encryption from Lattices},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {99--119},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_6},
  doi          = {10.1007/978-3-030-31578-8\_6},
  timestamp    = {Wed, 20 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/WangZHWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/WijayaLSLJS19,
  author       = {Dimaz Ankaa Wijaya and
                  Joseph K. Liu and
                  Ron Steinfeld and
                  Dongxi Liu and
                  Fengkie Junis and
                  Dony Ariadi Suwarsono},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Designing Smart Contract for Electronic Document Taxation},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {199--213},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_11},
  doi          = {10.1007/978-3-030-31578-8\_11},
  timestamp    = {Fri, 11 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/WijayaLSLJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/WijayaLSLL19,
  author       = {Dimaz Ankaa Wijaya and
                  Joseph K. Liu and
                  Ron Steinfeld and
                  Dongxi Liu and
                  Limerlina},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Senarai: {A} Sustainable Public Blockchain-Based Permanent Storage
                  Protocol},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {235--246},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_13},
  doi          = {10.1007/978-3-030-31578-8\_13},
  timestamp    = {Wed, 20 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/WijayaLSLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/XinLSL19,
  author       = {Wenqian Xin and
                  Yunwen Liu and
                  Bing Sun and
                  Chao Li},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Improved Cryptanalysis on SipHash},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {61--79},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_4},
  doi          = {10.1007/978-3-030-31578-8\_4},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/XinLSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/Yuen19,
  author       = {Tsz Hon Yuen},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {PAChain: Private, Authenticated and Auditable Consortium Blockchain},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {214--234},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_12},
  doi          = {10.1007/978-3-030-31578-8\_12},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/Yuen19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ZhangLHZJ19,
  author       = {Yanhua Zhang and
                  Ximeng Liu and
                  Yupu Hu and
                  Qikun Zhang and
                  Huiwen Jia},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving
                  Shorter Key-Sizes and Explicit Traceability with Ease},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {120--140},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_7},
  doi          = {10.1007/978-3-030-31578-8\_7},
  timestamp    = {Fri, 11 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/ZhangLHZJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ZhangQMZ19,
  author       = {Meng Zhang and
                  Saiyu Qi and
                  Meixia Miao and
                  Fuyou Zhang},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Enabling Compressed Encryption for Cloud Based Big Data Stores},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {270--287},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_15},
  doi          = {10.1007/978-3-030-31578-8\_15},
  timestamp    = {Fri, 11 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/ZhangQMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ZhangWX19,
  author       = {Zhengyu Zhang and
                  Puwen Wei and
                  Haiyang Xue},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism
                  in the Multi-challenge Setting},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {141--160},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_8},
  doi          = {10.1007/978-3-030-31578-8\_8},
  timestamp    = {Fri, 11 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/ZhangWX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ZhengH19,
  author       = {Mengce Zheng and
                  Honggang Hu},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Implicit Related-Key Factorization Problem on the {RSA} Cryptosystem},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {525--537},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_29},
  doi          = {10.1007/978-3-030-31578-8\_29},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/ZhengH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2019,
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8},
  doi          = {10.1007/978-3-030-31578-8},
  isbn         = {978-3-030-31577-1},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics