|
|

楼主 |
发表于 2024-2-27 14:45:16
|
显示全部楼层
本帖最后由 SmithArno 于 2024-2-27 14:49 编辑 9 C. b: Z: g: [* C9 {8 f
y# ~% u+ X% k3 D2 V2 WPKC 2024 (公钥密码学顶会),全球共接收54篇文章,国内12篇,上海交通大学谷大武老师组尤其高产。国内小计:
0 d* D# e9 f" r. l+ _6 r' A上海交通大学6篇,山东大学2篇,华东师范大学2篇,武大、西电各1篇。
: V# M& |! Q8 I/ {4 F
: f" s+ q6 w* m: A/ K【1】华东师范大学
5 G" W0 |. _# ^2 Q7 cPublic-key Encryption with Keyword Search in Multi-User, Multi-Challenge Setting under Adaptive Corruptions
2 g. J! I) L# D1 [Yunhao Ling, Kai Zhang, Jie Chen, Qiong Huang, Haifeng Qian
* {/ T r7 M. qEast China Normal University, Shanghai University of Electric Power, South China Agricultural University% V' W% y# z5 D2 I: \ \' g; u6 e
5 w; T2 r; Z( |+ ~【2】武汉大学: `! l6 a6 c4 H# j, ^+ c6 `$ `8 J
Parameter-Hiding Order-Revealing Encryption without Pairings
2 V' ?" E3 c# Q) t# @/ a7 TCong Peng, Rongmao Chen, Yi Wang, Debiao He, Xinyi Huang( f! r# @& |' b+ P, G/ h/ b! I
Wuhan University, National University of Defense Technology, Hong Kong University of Science and Technology$ j( Q: ?( r; n1 A; j; H
- ^! f9 ~( W/ \0 l1 h
【3】上海交通大学
8 \- B/ S. r3 y4 V* j f% R3 BReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head
9 u+ _- a" j3 x( q+ ] }Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang, Yu Yu, Kaiyi Zhang. ^9 C. G$ x5 e5 ]% n* t T7 X- l
Shanghai Jiao Tong University, China, Shanghai Qi Zhi Institute, China, State Key Laboratory of Cryptology, China5 j, Z; Y/ O8 } P. Y/ y9 r
3 J( V# v( a3 Z( u【4】上海交通大学0 k5 e0 S( o7 x3 j0 G7 e6 f0 V+ ~2 l
Efficient KZG-based Univariate Sum-check and Lookup Argument! H- Y% h% ?5 U. L4 P# R( j7 \0 g' J
Yuncong Zhang, Shi-Feng Sun, Dawu Gu. G8 |- m. @. ~4 a; E
Shanghai Jiao Tong University, Shanghai Jiao Tong University and Shanghai Jiao Tong University (Wuxi) Blockchain Advanced Research Center. d! O( G: [; O5 D# e0 V* v
; X! l% J. N0 r/ V【5】上海交通大学) F8 S- K& f& r. {6 x
Ring/Module Learning with Errors under Linear Leakage - Hardness and Applications0 ~' X1 P0 U- n" Y8 Y
Zhedong Wang, Qiqi Lai, Feng-Hao Liu: \3 p# ~1 w- |
School of Cyber Science and Engineering, Shanghai Jiao Tong University, School of Computer Science, Shaanxi Normal University, Washington State University% P( s8 k; f! T" u3 ~0 B% h6 o
4 V# d$ W( z4 {- t8 N, O
【6】上海交通大学0 {: \1 Q( [! |) ]) H; |# O% ?7 E
Tagged Chameleon Hash from Lattices and Application to Redactable Blockchain" }# z! t1 ~ T* [
Yiming Li, Shengli Liu
3 t$ l2 z! f) B% z3 j0 t+ o4 Y& dShanghai Jiao Tong University, China( ?4 m9 T) H4 U! d
$ c+ W: \ }' B$ N! j% V j! l; B, E【7】山东大学
5 ^3 _8 |3 X/ u# W5 q; QCryptanalysis of the Peregrine Lattice-Based Signature Scheme
+ f( K: T6 t+ r& z! ]7 H% E* BXiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu, Mehdi Tibouchi, Masayuki Abe
; Y9 q# P' `$ g6 c; M* Y7 D# ]Shandong University, Kyoto University, Tsinghua University, PQShield, NTT Social Informatics Laboratories3 P+ i0 M$ O0 m+ `' ~7 {
& ^ _ J& e" a' d( q【8】上海交通大学0 G, d+ c) m$ R3 o% |# J, v
More Efficient Public-Key Cryptography with Leakage and Tamper Resilience# F+ t5 x& `- b# \, }: W
Shuai Han, Shengli Liu, Dawu Gu
- ]3 V6 a3 [" h4 G' F. DShanghai Jiao Tong University, China
8 M5 Z1 @: U( R# F: U3 ]2 [6 I2 i+ C- d9 ?4 _3 M( \; C o
【9】西安电子科技大学, h# q- a/ |4 P. H5 @
A Refined Hardness Estimation of LWE in Two-step Mode2 c4 \; \0 ]+ M2 l' v
Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang# V+ Z! J c ]( _9 b. f: g
Xidian University, Shanghai Jiao Tong University, Shanghai Jiao Tong University, Xidian University
3 R: `* }1 q( H8 _/ C: k: \8 L- E9 Q1 n7 ^1 z
【10】华东师范大学
" c) b! h( N& T4 w1 ERegistered Attribute-Based Signature+ f. e; g) H& N4 y
Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong, Jie Chen
2 H' D9 A3 |# G5 T! {, h2 q1 WECNU
' W, d. H8 G4 ^7 R1 b5 M, ^" q2 v" ^, {. J
【11】山东大学
" V8 I6 o- q# j& x' w; FPrivate Set Operations from Multi-Query Reverse Private Membership Test& m. l' B( z( o. ~- t4 y
Yu Chen, Min Zhang, Cong Zhang, Minglang Dong, Weiran Liu
- y+ N( A% T0 \6 u' }Shandong University, Tsinghua University, Alibaba Group
" c; R( ?1 }$ C/ _* c4 |; h. u0 x+ E6 n" P
【12】上海交通大学
$ n! i, m. v. Z8 V& n0 QMulti-Hop Fine-Grained Proxy Re-Encryption7 h' S4 ^% ?: U h$ H; N
Yunxiao Zhou, Shengli Liu, Shuai Han2 G" W o0 {, `3 x
Shanghai Jiao Tong University, China! `/ m! z% o2 G6 z% T
|
|