- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This three-set volume LNCS 16217-16219 constitutes the refereed proceedings of 27th International Conference on Information and Communications Security, ICICS 2025, held in Nanjing, China, during October 29-31, 2025.
The 91 full papers presented in this book were carefully selected and reviewed from 357 submissions. The papers are organized in the following topical sections:
Part I: Cryptography; Post-quantum Cryptography; Anonymity and Privacy; Authentication and Authorization.
Part II: Blockchain and Cryptocurrencies, System and Network Security, Security and Privacy of AI, Machine Learning for Security.
Part III: Attack and Defense; Vulnerability Analysis; Anomaly Detection; Traffic Classification; Steganography and Watermarking.
Contents
.- Cryptography.
.- Multi-Signer Locally Verifiable Aggregate Signature from (Leveled) Multilinear Maps.
.- Conditional Attribute-based Encryption with Keyword Search for Pay-Per-Query Commercial Model.
.- Lightweight Transparent Zero-Knowledge Proofs for Cross-Domain Statements.
.- Public Verifiable Server-Aided Revocable Attribute-Based Encryption.
.- New First-Order Secure AES Implementation without Online Fresh Randomness Records.
.- SM2-VBKE: Achieving Cryptographic Binding Between Verification Integrity and Key Generation.
.- Certificate-Based Quasi-Linearly Homomorphic Signatures: Definition, Construction, and Application to Data Integrity Auditing.
.- Zero-Knowledge Protocols with PVC Security: Striking the Balance between Security and Efficiency.
.- Attribute-Based Adaptor Signature and Application in Control-based Atomic Swap.
.- A Versatile Decentralized Attribute Based Signature Scheme for IoT.
.- Post-quantum Cryptography.
.- Cross-Domain Lattice-based DAA Scheme with Shared Private-Key for Internet of Things System.
.- Compact Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors.
.- MDKG: Module-lattice-based Distributed Key Generation.
.- Turtle Wins Rabbit Again: Faster Modulus Reduction for RNS-CKKS.
.- A BGV-subroutinted CKKS Bootstrapping Algorithm without Sine Approximation.
.- PolarKyber: Polished Kyber with Smaller Ciphertexts, Greater Security Redundancy, and Lower Decryption Failure Rate.
.- Lion: A New Ring Signature Construction from Lattice Gadget.
.- Anonymity and Privacy.
.- MagWatch: Exposing Privacy Risks in Smartwatches through Electromagnetic Signals.
.- Privacy-preserving, Secure and Certificate-based Integrity Auditing for Cloud Storage.
.- Unbalanced Private Computation on Set Intersection with Reduced Computation and Communication.
.- Artemis: Decentralized, Secure, and Efficient Safety Monitoring with Dynamic Trajectories.
.- Privacy-preserving Framework for k-modes Clustering Based on Personalized Local Differential Privacy.
.- AnoST: An Anonymous Optimistic Verification System Based on Off-Chain State Transition.
.- Privacy-Preserving K-hop Shortest Path Query on Encrypted Graphs Based on Graph Pruning.
.- TA-PDC: Provable Data Contribution with Traceable Anonymous for Group Transactions.
.- Fine-filter: An Effective Defense against Poisoning Attacks on Frequency Estimation under LDP.
.- BioVite: Efficient and Compact Privacy-Preserving Biometric Verification via Fully Homomorphic Encryption.
.- Authentication and Authorization.
.- Circulation Control Model and Administration for Geospatial Data.
.- Identifying Unusual Personal Data in Mobile Apps for Better Privacy Compliance Check.
.- Why Biting the Bait? Understanding Bait and Switch UI Dark Patterns in Mobile Apps.