The conference proceeding can be download at https://link.springer.com/book/10.1007/978-3-031-20917-8.

Epoch Confidentiality in Updatable Encryption
Jodie Knapp and Elizabeth Quaglia
Information Security Group, Royal Holloway, University of London
Fast Out-of-band Data Integrity Monitor to Mitigate Memory Corruption Attacks
Jian Huang1,2, Shanliang Xue1,2 and Caiyi Wang1,2
1.Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China
2.Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing 211106, China
Subverting Deniability
Marcel Armour and Elizabeth Quaglia
Royal Holloway, University of London
Simplified Server-Aided Revocable Identity-Based Encryption from Lattices
Yanhua Zhang1, Ximeng Liu2and Yupu Hu3
1.Zhengzhou University of Light Industry, Zhengzhou, 450001, China
2.Fuzhou University, Fuzhou, 350108, China
3.Xidian University, Xi’an, 710071, China
Construction of a New UAV Management System based on UMIA Technology
Ge Zhang1, Yu Geng2, Xueman Kong2 and Yifa Li2
1.China Industrial Control Systems Cyber Emergency Response Team, Beijing, China
2.School of Cyberspace Security, Zhengzhou University, Zhengzhou, China
A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test
Kyoichi Asano1,2, Keita Emura2, Atsushi Takayasu3 and Yohei Watanabe1,2
1.The University of Electro-Communications, 1-5-1, Chofugaoka, Chofu, Tokyo,182-8585, Japan
2.National Institute of Information and Communications Technology, 4-2-1,Nukui-Kitamachi, Koganei, Tokyo, 184-8795, Japan
3.The University of Tokyo, 7-3-1, Hongo, Bunkyo-ku, Tokyo, 113-8656, Japan
Secure-Channel Free Certificateless Searchable Public key Authenticated Encryption with Keyword Search
Pan Yang1, Hongbo Li1, Jianye Huang2, Hao Zhang3, Man Ho Au4 and Qiong Huang1,5
1.College of Mathematics and Informatics, South China Agricultural University, Guangzhou, 510642, China
2.School of Computing and Information Technology, University of Wollongong, NSW 2500, Australia
3.The 5th Electronics Research Institute of the Ministry of Industry and Information Technology, Guangzhou 510610, China
4.Department of Computer Science, The University of Hong Kong, Hong Kong, China
5.Guangzhou Key Lab of Intelligent Agriculture, Guangzhou 510642, China
Reinforcement-Mining: Protecting Reward in Selfish Mining
Zhaojie Wang1, Willy Susilo2, Jianan Guo1, Yilei Wang1 and Minghao Zhao3
1.School of Computer Science, Qufu Normal University, Rizhao, China
2.School of Computing and Information Technology, University of Wollongong, Wollongong, Australia
3.School of Data Science and Engineering, East China Normal University, Shanghai, China
FP2-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning
Zhaobo Lu1, Yilei Wang1, Qingzhe Lv1, Minghao Zhao2 and Tiancai Liang3
1.School of Computer Science, Qufu Normal University, Rizhao, 276826, China
2.School of Computer Science and Technology, East China Normal University, Shanghai, 200062, China
3.Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou, 510700, China
More Efficient Verifiable Functional Encryption
Geng Wang, Ming Wan and Dawu Gu
School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University, 200240, P.R.China
(Public) Verifiability For Composable Protocols Without Adaptivity Or Zero-Knowledge
Carsten Baum1, Bernardo David2 and Rafael Dowsley3
1.Aarhus University⋆, Denmark
2.IT University Copenhagen⋆⋆ , Denmark
3.Monash University, Australia
Lattice-based Public Key Cryptosystems invoking Linear Mapping Mask
Yuntao Wang1, Yasuhiko Ikematsu2 and Takanori Yasuda3
1.Graduate School of Engineering, Osaka University
2.Institute of Mathematics for Industry, Kyushu University
3.Institute for the Advancement of Higher Education, Okayama University of Science
FolketID: A Decentralized Blockchain-based NemID Alternative against DDoS Attacks
Wei-Yang Chiu1, Weizhi Meng1, Wenjuan Li2 and Liming Fang1
1.SPTAGE Lab, DTU Compute, Technical University of Denmark, Denmark
2.Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, China
Batched Fully Dynamic Multi-key FHE from FHEW-like Cryptosystems
Yuting Jiang1, Jianghong Wei2 and Jing Pan3
1.State Key Laboratory of Integrated Service Networks(ISN), Xidian University, Xi'an 710071, China
2.State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Strategic Support Force Information Engineering University, Zhengzhou, 450001, China
3.Guangzhou Institute of Technology, Xidian university, Guangzhou 510555, China
Practical Federated Learning for Samples with Different IDs
Yu Li, Junzuo Lai, Xiaowei Yuan and Beibei Song
College of Information Science and Technology, Jinan University
Practical Non-Malleable Codes from Symmetric-key Primitives in 2-Split-State Model
Anit Kumar Ghosal, Satrajit Ghosh and Dipanwita Roychowdhury
Department of Computer Science and Engineering, IIT Kharagpur, India
Secure Collaboration between Consortiums in Permissioned Blockchains
Huang Juzheng1, Qiang Tang2, Chunhua Su3 and Na Ruan1
1.Shanghai Jiaotong University, Shanghai, China
2.The University of Sydney, Sydney, Australia
3.University of Aizu, Aizuwakamatsu, Japan
Cryptographic Role-Based Access Control, Reconsidered
Bin Liu1, Antonis Michalas1,2 and Bogdan Warinschi3,4
1.Tampere University
2.RISE Research Institutes of Sweden
3.DFINITY
4.University of Bristol
Zero-knowledge Range Arguments for Signed Fractional Numbers from Lattices
Priyanka Dutta1, Dung Hoang Duong1, Willy Susilo1, Kazuhide Fukushima 2and Shinsaku Kiyomoto2
1.Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong Northfields Avenue, Wollongong NSW 2522, Australia
2.Information Security Laboratory KDDI Research, Inc. 2-1-15 Ohara, Fujimino-shi, Saitama, 356-8502, Japan