Accepted papers

Cross-chain trusted information match scheme with privacy-perserving and auditability
Zheng Chen, Jiageng Chen, Zejun Lu

Verifiable Attribute-Based Proxy Re-Encryption with Non-repudiation based on Block-Chain
Yaorui He, Ting Liang, Pei Huang, Zhe Xia

A distributed lightweight identity authentication method in Satellite network
Bo Tang, Shixiong Yao, Pei Li, Xiaokaiti Aini

Blockchain-Based Hierarchical Access Control with Efficient Revocation in mHealth System
Ting Liang, Yaorui He, Pei Huang, Zhe Xia

A suvey of algorithms for addressing the Shortest Vector Problem (SVP)
Errui He, Tianyu Xu, Mengsi Wu, Jiageng Chen, Shixiong Yao, Pei Li

DRSA: Debug Register-Based Self-relocating Attack against software-based remote authentication
Zheng Zhang, Jingfeng Xue, Tianshi Mu, Ting Yu, Kefan Qiu, Tian Chen, YuanZhang Li

Intellectual Property Data Trading through NFTization
Ziyang Ji, Jie Zhang, Steve Guan, Ka Lok Man

Fuzz Testing of UAV Configurations Based on Evolutionary Algorithms
Yuexuan Ma, Xiao Yu, Yuanzhang Li, Li Zhang, Yuan Tan

PSWS: Private Support-Weighted Sum Protocol for Privacy-Preserving Blockchain-Based Voting with Ballot Secrecy
Chenyu Deng, Mingwu Zhang

Identity-Based Key Verifiable Inner Product Functional Encryption Scheme
Mingwu Zhang, Chao He, Gang Shen