|

楼主 |
发表于 2024-2-27 14:45:16
|
显示全部楼层
本帖最后由 SmithArno 于 2024-2-27 14:49 编辑 ) S: L3 t9 v" V. b* s
8 ~2 a4 p9 C( G1 E8 N
PKC 2024 (公钥密码学顶会),全球共接收54篇文章,国内12篇,上海交通大学谷大武老师组尤其高产。国内小计:
& e4 A" u6 B; ~) u9 M q1 R上海交通大学6篇,山东大学2篇,华东师范大学2篇,武大、西电各1篇。2 c0 T5 k" i# x0 s, A# \1 m) k: q
; a1 M; _. c/ @* o+ y
【1】华东师范大学- T7 Q* Z; }/ ]4 }* ?) e# Z
Public-key Encryption with Keyword Search in Multi-User, Multi-Challenge Setting under Adaptive Corruptions
: f1 t4 d& e' B: ], u U0 y1 Z2 JYunhao Ling, Kai Zhang, Jie Chen, Qiong Huang, Haifeng Qian
& a( D, L* c+ ^: U. K5 o+ P$ f2 r2 p+ EEast China Normal University, Shanghai University of Electric Power, South China Agricultural University
7 J v/ @- Z' \, r0 P$ ]0 F, h2 o; _7 n6 e: m, j+ x1 ]5 {1 ]
【2】武汉大学" p+ T2 Y; n1 `4 U+ ~
Parameter-Hiding Order-Revealing Encryption without Pairings
$ a7 p5 f' n: t% }- z1 W9 U; CCong Peng, Rongmao Chen, Yi Wang, Debiao He, Xinyi Huang
* {! v& S7 \5 ^3 y$ k, gWuhan University, National University of Defense Technology, Hong Kong University of Science and Technology
5 V% A+ v2 A) t$ M) F- p% E; |/ l% a& O4 S+ e# T H' a" X
【3】上海交通大学
2 Y* a, S) w. `8 MReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head3 x' P( D; B/ H/ F0 b
Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang, Yu Yu, Kaiyi Zhang
9 n! U/ s5 Z: Y) M( Y; xShanghai Jiao Tong University, China, Shanghai Qi Zhi Institute, China, State Key Laboratory of Cryptology, China$ b: b6 f: w1 u- u& K; V8 f
3 y) `) q D" A7 y: {0 }+ {) |
【4】上海交通大学4 {$ c5 N# T: b8 b
Efficient KZG-based Univariate Sum-check and Lookup Argument5 F! X% v% V+ i3 s
Yuncong Zhang, Shi-Feng Sun, Dawu Gu7 h* D( t) G D) t$ R. D% Y! H
Shanghai Jiao Tong University, Shanghai Jiao Tong University and Shanghai Jiao Tong University (Wuxi) Blockchain Advanced Research Center
2 a: i# S0 [. A
' l: a* N2 t7 ^ i【5】上海交通大学8 W6 q9 t6 M+ U0 C q! Z
Ring/Module Learning with Errors under Linear Leakage - Hardness and Applications
8 J- g2 Y- m0 ?* I. S1 C+ r3 \+ hZhedong Wang, Qiqi Lai, Feng-Hao Liu' ~, I) ?: W, G# K! _
School of Cyber Science and Engineering, Shanghai Jiao Tong University, School of Computer Science, Shaanxi Normal University, Washington State University2 m, K4 S, c: }6 x" l
/ N1 l/ R2 t' F! ?9 }4 d" r8 {
【6】上海交通大学
5 V% S; R: s/ Q5 A4 PTagged Chameleon Hash from Lattices and Application to Redactable Blockchain, k5 j& |) |& X# ]. B' K
Yiming Li, Shengli Liu# N6 `+ n% }6 P9 B. g _
Shanghai Jiao Tong University, China2 ~+ Z; A; F; {# G0 K
8 E0 X/ A. G, S5 B6 E【7】山东大学. f* a- U' y1 ]+ N0 t3 n% O" l
Cryptanalysis of the Peregrine Lattice-Based Signature Scheme4 b& y& A' M0 w5 m
Xiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu, Mehdi Tibouchi, Masayuki Abe
3 T6 }5 p/ A. C2 U. qShandong University, Kyoto University, Tsinghua University, PQShield, NTT Social Informatics Laboratories9 A* f8 N! J( y2 }2 \/ p
6 w) T: R2 h+ d0 ?% U8 M
【8】上海交通大学 w! I/ w* C G- P1 [
More Efficient Public-Key Cryptography with Leakage and Tamper Resilience
4 [/ D1 x5 C! `8 P' o% ~Shuai Han, Shengli Liu, Dawu Gu9 Y7 n" N* |2 O
Shanghai Jiao Tong University, China
% P! X! N+ V4 l7 U5 }' C' p2 O' h0 f/ y4 [% q. R V: ]6 e
【9】西安电子科技大学
4 o! _/ e, h) O- [' |4 GA Refined Hardness Estimation of LWE in Two-step Mode
- J- z* ^1 D7 q5 m+ @; rWenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang
) i9 v, w* n% `" G. c' O' [) EXidian University, Shanghai Jiao Tong University, Shanghai Jiao Tong University, Xidian University, B7 \' `- K& k5 \# o) J) W
5 [) u0 f7 V$ F& d& _8 Q5 M5 z【10】华东师范大学# a1 i+ }3 O7 E- _
Registered Attribute-Based Signature% P) }) T! L, @# q$ L5 X* L
Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong, Jie Chen
4 H2 n' S( I1 i) z5 {5 eECNU
- q5 @8 v0 K* J" A% R/ T8 m4 [! \, @- j& }7 j0 V# s
【11】山东大学
% Q; E v6 F/ Q$ z2 dPrivate Set Operations from Multi-Query Reverse Private Membership Test
2 R3 |9 E, x d) Y: {Yu Chen, Min Zhang, Cong Zhang, Minglang Dong, Weiran Liu$ l- c" ]3 @* H. R0 c
Shandong University, Tsinghua University, Alibaba Group
+ O& X# D! \& p0 D4 D
( A$ J* H" ]9 C# @【12】上海交通大学
. L Q/ b) p1 C3 Q4 s2 F) f: AMulti-Hop Fine-Grained Proxy Re-Encryption
% s3 k- e! L; o/ kYunxiao Zhou, Shengli Liu, Shuai Han: n0 K* j, @+ q0 n. @
Shanghai Jiao Tong University, China
* H5 S7 a3 s- c. ^! C7 [ |
|