Signature: TVES: Threshold Verifiably Encrypted Signature and Its Applications
Compact Accountable Ring Signatures in the Plain Model
Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
Compact Ring Signatures with Post-Quantum Security in Standard Model
Secure Multi-Party SM2 Signature based on SPDZ Protocol
Blockchain: Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption
A General Federated Learning Scheme with Blockchain on non-IID Data
A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy Preservation
Cryptography primitive: General Constructions of Fuzzy Extractors for Continuous Sources
Geometry-based Garbled Circuits Relying Solely on One Evaluation Algorithm under Standard Assumption
Full Domain Functional Bootstrapping with Least Significant Bit Encoding
Public key cryptography: PFE: Linear Active Security, Double-Shuffle Proofs, and LowComplexity Communication
CCA-secure Identity-Based Matchmaking Encryption from Standard Assumptions.-Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications
Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction
Identity-Based Proxy Re-encryption Based on SM9
Security and Privacy: SecCDS: Secure Crowdsensing Data Sharing Scheme Supporting Aggressive Query
An Improved Method for Evaluating Secret Variables and Its Application to WAGE
Exploring Emotion Trends in Product Reviews: A Multi-modal Analysis with Malicious Comment Filtering and User Privacy Protection
XPORAM: A Practical Multi-Client ORAM against Malicious Adversaries
A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement
A Lightweight Access Control Scheme Supporting Policy Hidden based on Path Bloom Filter
MFL-RAT: Multi-class Few-shot Learning Method For Encrypted RAT Traffic Detection.