default search action
26th ESORICS 2021: Darmstadt, Germany - Part II
- Elisa Bertino, Haya Schulmann, Michael Waidner:
Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12973, Springer 2021, ISBN 978-3-030-88427-7
Encryption
- Tianyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, Hai Jin:
Bestie: Very Practical Searchable Encryption with Forward and Backward Security. 3-23 - Shabnam Kasra Kermanshahi, Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal, Xun Yi:
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy. 24-43 - Chunyang Lv, Jianfeng Wang, Shifeng Sun, Yunling Wang, Saiyu Qi, Xiaofeng Chen:
Efficient Multi-client Order-Revealing Encryption and Its Applications. 44-63 - Peter Chvojka, Tibor Jager, Daniel Slamanig, Christoph Striecks:
Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstract). 64-85 - Marc Fischlin, Sven-André Müller, Jean-Pierre Münch, Lars Porth:
Multipath TLS 1.3. 86-105 - Tran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jongkil Kim, Yang-Wai Chow, Dongxi Liu:
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments. 106-126 - Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu:
Security Analysis of SFrame. 127-146 - Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu:
Attribute-Based Conditional Proxy Re-encryption in the Standard Model Under LWE. 147-168 - Willy Susilo, Priyanka Dutta, Dung Hoang Duong, Partha Sarathi Roy:
Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Model. 169-191 - Leixiao Cheng, Fei Meng:
Server-Aided Revocable Attribute-Based Encryption Revised: Multi-User Setting and Fully Secure. 192-212
Cryptography
- Gildas Avoine, Xavier Carpent, Diane Leblanc-Albarel:
Precomputation for Rainbow Tables has Never Been so Fast. 215-234 - Alexandra Weber, Oleg Nikiforov, Alexander Sauer, Johannes Schickel, Gernot Alber, Heiko Mantel, Thomas Walther:
Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography. 235-256 - Zimin Zhang, Wenying Zhang, Hongfang Shi:
Genetic Algorithm Assisted State-Recovery Attack on Round-Reduced Xoodyak. 257-274 - Catherine Meadows:
Moving the Bar on Computationally Sound Exclusive-Or. 275-295 - Jianghong Wei, Guohua Tian, Jun Shen, Xiaofeng Chen, Willy Susilo:
Optimal Verifiable Data Streaming Protocol with Data Auditing. 296-312 - Xianrui Qin, Cailing Cai, Tsz Hon Yuen:
One-More Unforgeability of Blind ECDSA. 313-331 - Hongrui Cui, Kaiyi Zhang, Yu Chen, Zhen Liu, Yu Yu:
MPC-in-Multi-Heads: A Multi-Prover Zero-Knowledge Proof System - (or: How to Jointly Prove Any NP Statements in ZK). 332-351 - Octavian Catrina:
Complexity and Performance of Secure Floating-Point Polynomial Evaluation Protocols. 352-369 - Stefan Steinegger, David Schrammel, Samuel Weiser, Pascal Nasahl, Stefan Mangard:
SERVAS! Secure Enclaves via RISC-V Authenticryption Shield. 370-391
Privacy
- Yanjun Zhang, Guangdong Bai, Xue Li, Caitlin Curtis, Chen Chen, Ryan K. L. Ko:
Privacy-Preserving Gradient Descent for Distributed Genome-Wide Analysis. 395-416 - Raúl Pardo, Willard Rafnsson, Christian W. Probst, Andrzej Wasowski:
Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis. 417-438 - Daniël Reijsbergen, Zheng Yang, Aung Maw, Tien Tuan Anh Dinh, Jianying Zhou:
Transparent Electricity Pricing with Privacy. 439-460 - Dominic Deuber, Dominique Schröder:
CoinJoin in the Wild - An Empirical Analysis in Dash. 461-480 - Alessandra Scafuro, Bihan Zhang:
One-Time Traceable Ring Signatures. 481-500 - Patryk Koziel, Przemyslaw Kubiak, Miroslaw Kutylowski:
PACE with Mutual Authentication - Towards an Upgraded eID in Europe. 501-519
Differential Privacy
- Naoise Holohan, Stefano Braghin:
Secure Random Sampling in Differential Privacy. 523-542 - Lovedeep Gondara, Ricardo Silva Carvalho, Ke Wang:
Training Differentially Private Neural Networks with Lottery Tickets. 543-562 - Natasha Fernandes, Yusuke Kawamoto, Takao Murakami:
Locality Sensitive Hashing with Extended Differential Privacy. 563-583
Zero Knowledge
- Julien Devigne, Céline Duguey, Pierre-Alain Fouque:
MLS Group Messaging: How Zero-Knowledge Can Secure Updates. 587-607 - Jonathan Bootle, Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler:
More Efficient Amortization of Exact Zero-Knowledge Proofs for LWE. 608-627 - Zhelei Zhou, Xinle Cao, Jian Liu, Bingsheng Zhang, Kui Ren:
Zero Knowledge Contingent Payments for Trained Neural Networks. 628-648
Key Exchange
- Huanhuan Lian, Tianyu Pan, Huige Wang, Yunlei Zhao:
Identity-Based Identity-Concealed Authenticated Key Exchange. 651-675 - Sebastian Ramacher, Daniel Slamanig, Andreas Weninger:
Privacy-Preserving Authenticated Key Exchange: Stronger Privacy and Generic Constructions. 676-696
Multi-party Computation
- Yibiao Lu, Bingsheng Zhang, Hong-Sheng Zhou, Weiran Liu, Lei Zhang, Kui Ren:
Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation. 699-720 - Aydin Abadi, Steven J. Murdoch, Thomas Zacharias:
Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited. 721-742
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.