{"title":"Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based Encryption","authors":"Rui Zhang, Yang Tao","doi":"10.1007/978-3-030-01950-1_25","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_25","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"24 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124065826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi
{"title":"Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes","authors":"Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi","doi":"10.1007/978-3-030-01950-1_11","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_11","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124300586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yao Lu, N. Kunihiro, Rui Zhang, Liqiang Peng, Hui Ma
{"title":"Certifying Variant of RSA with Generalized Moduli","authors":"Yao Lu, N. Kunihiro, Rui Zhang, Liqiang Peng, Hui Ma","doi":"10.1007/978-3-030-01950-1_35","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_35","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131671315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing","authors":"Meng Zheng, Jun Zhou, Z. Cao, Xiaolei Dong","doi":"10.1007/978-3-030-01950-1_13","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_13","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117325222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simpler CCA Secure PKE from LPN Problem Without Double-Trapdoor","authors":"Haitao Cheng, Xiangxue Li, Hai-feng Qian, Di Yan","doi":"10.1007/978-3-030-01950-1_46","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_46","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122944275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption","authors":"Yunong Liang, Z. Cao, Xiaolei Dong, Jiachen Shen","doi":"10.1007/978-3-030-01950-1_22","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_22","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126389844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerating Integer Based Fully Homomorphic Encryption Using Frequency Domain Multiplication","authors":"Shakirah Hashim, M. Benaissa","doi":"10.1007/978-3-030-01950-1_10","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_10","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123668006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verifiable Single-Server Private Information Retrieval","authors":"Xingfeng Wang, Liang Zhao","doi":"10.1007/978-3-030-01950-1_28","DOIUrl":"https://doi.org/10.1007/978-3-030-01950-1_28","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121942384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}