|

楼主 |
发表于 2024-2-27 14:45:16
|
显示全部楼层
本帖最后由 SmithArno 于 2024-2-27 14:49 编辑
- @' J1 O' i. m6 x J1 K* c& R
/ e/ o$ T; f/ G) n/ x! kPKC 2024 (公钥密码学顶会),全球共接收54篇文章,国内12篇,上海交通大学谷大武老师组尤其高产。国内小计:
: L7 O" x; w+ H( `. x, a" ^/ f上海交通大学6篇,山东大学2篇,华东师范大学2篇,武大、西电各1篇。( t) i% H6 n) {# r
$ ^, g9 v- J/ S: c4 L3 `3 ]
【1】华东师范大学
; H& U; |3 d+ B0 }Public-key Encryption with Keyword Search in Multi-User, Multi-Challenge Setting under Adaptive Corruptions( L N7 m7 W4 R# H0 E! d
Yunhao Ling, Kai Zhang, Jie Chen, Qiong Huang, Haifeng Qian( n. q0 T! ?) }+ g# d
East China Normal University, Shanghai University of Electric Power, South China Agricultural University
' @; o) E0 r! m* `% G ?. K; e' \( k9 Q3 i! |1 H
【2】武汉大学7 i# w! }+ k( L/ F, c
Parameter-Hiding Order-Revealing Encryption without Pairings
* k9 M8 d9 x3 G' h UCong Peng, Rongmao Chen, Yi Wang, Debiao He, Xinyi Huang; r" u% N! A: N; c
Wuhan University, National University of Defense Technology, Hong Kong University of Science and Technology
3 g; c% d. Y3 ~) R( q, K2 f9 z2 M0 W2 u, G
【3】上海交通大学
% d3 s( D# i8 f [6 d4 \3 }ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head4 o% n; O3 |) i5 e
Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang, Yu Yu, Kaiyi Zhang
) D4 O# U: L) }6 g2 f- SShanghai Jiao Tong University, China, Shanghai Qi Zhi Institute, China, State Key Laboratory of Cryptology, China6 c" D9 M% l" X3 W& o
6 j# `% D' O0 K$ p6 R/ v6 @9 o$ ~
【4】上海交通大学
8 V9 g0 M9 I# L# |4 F) S, B. @Efficient KZG-based Univariate Sum-check and Lookup Argument8 E" ]7 G9 p4 f" B; w/ T
Yuncong Zhang, Shi-Feng Sun, Dawu Gu5 b0 T1 {7 R4 V+ k- d" ?& ]5 C
Shanghai Jiao Tong University, Shanghai Jiao Tong University and Shanghai Jiao Tong University (Wuxi) Blockchain Advanced Research Center* l4 U$ d& ]/ g$ j. k+ r1 |4 K
0 J3 W }" i- C+ ^- Y
【5】上海交通大学& z% m3 M, P+ d
Ring/Module Learning with Errors under Linear Leakage - Hardness and Applications
3 q+ b, z2 f4 [Zhedong Wang, Qiqi Lai, Feng-Hao Liu$ b- Y" P; x1 W c. ~/ q
School of Cyber Science and Engineering, Shanghai Jiao Tong University, School of Computer Science, Shaanxi Normal University, Washington State University! I H% ~' w, r8 P9 L: `( ]. `
: P! Y9 Y% o" `! q2 g2 t8 U【6】上海交通大学( k# {+ S% ~7 O, z# m* }0 \; } m
Tagged Chameleon Hash from Lattices and Application to Redactable Blockchain
' u3 m4 p7 r" x' a4 R5 i' b# cYiming Li, Shengli Liu4 W+ A' c1 s! D" f5 r5 U
Shanghai Jiao Tong University, China
6 g2 U7 X% Z; @: Q/ o* A- b2 m: f4 g+ |
% e- B" \5 H( [; B; H【7】山东大学
y) f7 Q# [& ]: e. ^Cryptanalysis of the Peregrine Lattice-Based Signature Scheme
% G* m1 e/ V. f. X8 ~Xiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu, Mehdi Tibouchi, Masayuki Abe
3 X( q+ Y: a8 ~9 {+ k# [( W& IShandong University, Kyoto University, Tsinghua University, PQShield, NTT Social Informatics Laboratories
! w) \" d0 a) d% i5 \* H n/ p7 ~( o, b- ]
【8】上海交通大学" D5 V% n( x! T0 @
More Efficient Public-Key Cryptography with Leakage and Tamper Resilience
: F6 _4 L) H9 r4 f' D2 dShuai Han, Shengli Liu, Dawu Gu; G1 l. r0 C7 m- i; C4 J& l4 C( j
Shanghai Jiao Tong University, China" t* \4 q \% Z$ X# p2 |
) J( C# P' }. }+ E: m3 `
【9】西安电子科技大学
" }7 O* j, ~, E+ n$ \! n6 CA Refined Hardness Estimation of LWE in Two-step Mode
# W7 Y4 Q% q# @" }" H _Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang, u z7 T# ]2 S. G9 R$ z; [3 d
Xidian University, Shanghai Jiao Tong University, Shanghai Jiao Tong University, Xidian University
% _0 ]" M5 g) ^) B% M8 T" W6 i% D b' P- B' I
【10】华东师范大学
) N8 o8 @: c/ XRegistered Attribute-Based Signature- R* H" V" y/ ]1 T& W
Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong, Jie Chen
7 i5 _+ |5 x) t; G% C0 O: jECNU
8 K- u* j5 p7 n# {5 f
0 K; t: x( `/ v5 s$ U5 t【11】山东大学
5 R( H: |+ ^6 H ? I3 _$ z# z' c. uPrivate Set Operations from Multi-Query Reverse Private Membership Test7 }8 ^+ `6 C. Z6 q4 \6 j( |. g
Yu Chen, Min Zhang, Cong Zhang, Minglang Dong, Weiran Liu
, D8 J# f/ k2 p% Z1 r/ X0 q9 u2 }Shandong University, Tsinghua University, Alibaba Group! V' k) j4 m/ f. g- I9 F- N6 e
6 |6 d2 D6 f9 q j x$ V v* k7 W
【12】上海交通大学
, p' `8 m r. n( f2 @9 JMulti-Hop Fine-Grained Proxy Re-Encryption9 m( g# h- g1 D& ~ R' f# Y
Yunxiao Zhou, Shengli Liu, Shuai Han
2 T& m+ R( L9 o, F! SShanghai Jiao Tong University, China
- v, q. e9 I2 R2 b" E |
|