|
|

楼主 |
发表于 2024-2-27 14:45:16
|
显示全部楼层
本帖最后由 SmithArno 于 2024-2-27 14:49 编辑
7 m P1 u% R; j# v6 Q/ o6 N; {, d: b" Q4 _% ?/ [
PKC 2024 (公钥密码学顶会),全球共接收54篇文章,国内12篇,上海交通大学谷大武老师组尤其高产。国内小计:
4 z$ q2 B. z3 @8 C- q' l上海交通大学6篇,山东大学2篇,华东师范大学2篇,武大、西电各1篇。+ A9 i9 Y2 B4 N5 P: x0 b5 y2 s' b% e
7 q" W( l7 G. g' _4 k6 k, G0 m
【1】华东师范大学
, M( B$ @5 C% v( O% y7 bPublic-key Encryption with Keyword Search in Multi-User, Multi-Challenge Setting under Adaptive Corruptions
, Q( Y# K% ?+ t$ y; E3 s* yYunhao Ling, Kai Zhang, Jie Chen, Qiong Huang, Haifeng Qian6 f$ r5 Z1 k2 o
East China Normal University, Shanghai University of Electric Power, South China Agricultural University
3 V6 Y# z! U$ M) w3 Q; w+ F* P; t2 g& x. B5 J* L
【2】武汉大学, n1 k _: z: z) C
Parameter-Hiding Order-Revealing Encryption without Pairings1 p+ f- s& e" `. y
Cong Peng, Rongmao Chen, Yi Wang, Debiao He, Xinyi Huang
6 e" }/ r: Q6 R/ F$ \Wuhan University, National University of Defense Technology, Hong Kong University of Science and Technology
# s8 [6 X8 t2 s2 m( U) T$ I) M1 p
1 s( q! ?& ^' S+ O【3】上海交通大学
7 y1 h y# @: F1 A3 @ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head: w7 @7 |5 @% J; C2 v' C* v# e
Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang, Yu Yu, Kaiyi Zhang
" r. b( y% ?9 L0 A1 `9 y+ E' {Shanghai Jiao Tong University, China, Shanghai Qi Zhi Institute, China, State Key Laboratory of Cryptology, China
$ [+ ^2 U# T4 E, f0 |+ g' i5 \
# N, f- ?8 v9 {( @) C& V+ e【4】上海交通大学' z# N4 B! x) u5 f2 c% D
Efficient KZG-based Univariate Sum-check and Lookup Argument
9 Z; P( `4 r+ K0 rYuncong Zhang, Shi-Feng Sun, Dawu Gu4 Y B1 T2 Q N/ m( W% K! ?
Shanghai Jiao Tong University, Shanghai Jiao Tong University and Shanghai Jiao Tong University (Wuxi) Blockchain Advanced Research Center( K- O! f7 D2 q& \ b
5 J( d4 R$ i/ c* G) c1 P$ ?【5】上海交通大学
0 h- K! @1 x' Z) ORing/Module Learning with Errors under Linear Leakage - Hardness and Applications
$ m, N2 a) g6 p, T7 a" EZhedong Wang, Qiqi Lai, Feng-Hao Liu% W& X. D+ R3 m$ p; b6 G
School of Cyber Science and Engineering, Shanghai Jiao Tong University, School of Computer Science, Shaanxi Normal University, Washington State University
& O6 C5 [. u' k. E* N6 V8 k q" Q+ A; g, p- [& v
【6】上海交通大学
7 p; I, s; t& x. {+ @; Q( \0 P" iTagged Chameleon Hash from Lattices and Application to Redactable Blockchain& @% u* W6 s- y! Q/ G6 x
Yiming Li, Shengli Liu
$ q$ Y* v4 ^, l, {; k) p; TShanghai Jiao Tong University, China
\1 ]7 [5 D" k' b S' h: T7 _/ @# m- E
【7】山东大学
- r6 E8 k0 c/ O+ L4 T( NCryptanalysis of the Peregrine Lattice-Based Signature Scheme
/ D7 @, j7 V( S! ZXiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu, Mehdi Tibouchi, Masayuki Abe! P" W) e( T) n# v$ b8 r( m
Shandong University, Kyoto University, Tsinghua University, PQShield, NTT Social Informatics Laboratories9 Y& q6 R$ p( Q. h' s e& M
- y9 G' c/ a3 a- V- O9 b* q3 f' _; k
【8】上海交通大学# d9 B. r6 G; m; K n
More Efficient Public-Key Cryptography with Leakage and Tamper Resilience& t$ R9 D; I; W/ I
Shuai Han, Shengli Liu, Dawu Gu8 n& Z+ \4 R2 R# ]/ F, I8 H2 f
Shanghai Jiao Tong University, China
( `$ r/ k+ V- M$ p$ E; L" ?! X+ X, c. |( q1 L( {" m; W3 u
【9】西安电子科技大学& {4 y/ ~# r' ?3 V" z% q
A Refined Hardness Estimation of LWE in Two-step Mode& s+ G% y2 P- F, V/ x, X- Z' R- I
Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang! V* `: ~' |+ I2 |- V9 T- _
Xidian University, Shanghai Jiao Tong University, Shanghai Jiao Tong University, Xidian University5 `5 e6 N7 x% Q( q; o
+ d4 v5 g+ \) P$ i
【10】华东师范大学; b9 j% a7 h/ S4 W
Registered Attribute-Based Signature
0 }! u! U Y# h- a& ^6 ~Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong, Jie Chen* h! h8 ]+ ~; v
ECNU
( U' ~% q7 x6 _! T/ e6 v, _3 E0 E5 L
【11】山东大学8 Q0 B n" Z! O( ~$ A+ @
Private Set Operations from Multi-Query Reverse Private Membership Test
- _8 r! e2 j0 S9 g# `0 I2 \Yu Chen, Min Zhang, Cong Zhang, Minglang Dong, Weiran Liu
2 n5 W4 g- l' J7 E$ X, {) b+ f- DShandong University, Tsinghua University, Alibaba Group
+ m$ ^6 W9 S4 a
% p- ~' c; n+ t+ [; S' Q【12】上海交通大学
) p% d0 F& F, Y% I$ A, U- C' ?1 U' b$ SMulti-Hop Fine-Grained Proxy Re-Encryption/ y( J+ J) N3 B# l
Yunxiao Zhou, Shengli Liu, Shuai Han
- d3 |$ B6 K7 [9 sShanghai Jiao Tong University, China
2 V3 Q4 y3 @3 x$ h0 X: m, L |
|