ebook img

Security and Privacy in Social Networks and Big Data: 8th International Symposium, SocialSec 2022, Xi'an, China, October 16–18, 2022, Proceedings PDF

372 Pages·2022·26.33 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Security and Privacy in Social Networks and Big Data: 8th International Symposium, SocialSec 2022, Xi'an, China, October 16–18, 2022, Proceedings

Xiaofeng Chen Xinyi Huang Mirosław Kutyłowski (Eds.) Communications in Computer and Information Science 1663 Security and Privacy in Social Networks and Big Data 8th International Symposium, SocialSec 2022 Xi’an, China, October 16–18, 2022 Proceedings Communications in Computer and Information Science 1663 EditorialBoardMembers JoaquimFilipe PolytechnicInstituteofSetúbal,Setúbal,Portugal AshishGhosh IndianStatisticalInstitute,Kolkata,India RaquelOliveiraPrates FederalUniversityofMinasGerais(UFMG),BeloHorizonte,Brazil LizhuZhou TsinghuaUniversity,Beijing,China Moreinformationaboutthisseriesathttps://link.springer.com/bookseries/7899 · · Xiaofeng Chen Xinyi Huang Mirosław Kutyłowski (Eds.) Security and Privacy in Social Networks and Big Data 8th International Symposium, SocialSec 2022 Xi’an, China, October 16–18, 2022 Proceedings Editors XiaofengChen XinyiHuang XidianUniversity FujianNormalUniversity Xi’an,China Fuzhou,China MirosławKutyłowski WrocławUniversityofScience andTechnology Wrocław,Poland ISSN 1865-0929 ISSN 1865-0937 (electronic) CommunicationsinComputerandInformationScience ISBN 978-981-19-7241-6 ISBN 978-981-19-7242-3 (eBook) https://doi.org/10.1007/978-981-19-7242-3 ©TheEditor(s)(ifapplicable)andTheAuthor(s),underexclusivelicense toSpringerNatureSingaporePteLtd.2022 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthors,andtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictionalclaimsin publishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSingaporePteLtd. Theregisteredcompanyaddressis:152BeachRoad,#21-01/04GatewayEast,Singapore189721,Singapore Preface The8thInternationalSymposiumonSecurityandPrivacyinSocialNetworksandBig Data(SocialSec2022)washeldduringOctober16–18,2022,inXi’an,China. This year the conference received 106 submissions. These papers were evaluated on the basis of their significance, novelty, and technical quality, as well as on their practicalimpactortheirlevelofadvancementofthefield’sfoundations.Eachpaperwas assignedtoatleastthreereferees.Finally,theProgramCommitteeselected23papersto beincludedintheconferenceprogram(resultinginanacceptancerateof21.7%).The revisedpaperswerenotsubjecttoeditorialreviewandtheauthorsbearfullresponsibility forthecontents.ThesubmissionandreviewprocessesweresupportedbytheEasyChair system.Besidesthepaperpresentations,wewerehonoredtohaveeightkeynotespeakers: ElisaBertino,MotiYung,XueminLin,JinjunChen,YanZhang,XinghuaLi,JinLi,and ZheliLiu,whoenhancedtheconference’sprogrambydeliveringilluminatingtalks. Thereisalonglistofpeoplewhovolunteeredtheirtimeandenergytoputtogether andorganizetheconference,andwhodeservespecialthanks.Firstly,wewouldliketo thanktheauthorsofallpapers(bothacceptedandrejected)forsubmittingtheirpapers tothisconference.Secondly,wemustthankallthemembersoftheProgramCommittee andtheexternalreviewersforalltheirhardworkinevaluatingthepapers.Wearealso very grateful to all the people whose work ensured a smooth organization process. Finally,anumberofinstitutesdeservethanksaswellfortheirgreatsupport:theState Key Laboratory of Integrated Services Networks (ISN), NSCLab, and the Xi’an Data SecurityandPrivacyPreservationISTCBase.Theconferencewaspartiallysponsored bytheChina111Project(No.B16037). July2022 XiaofengChen XinyiHuang MirosławKutyłowski Organization OrganizingCommittee HonoraryChairs ElisaBertino PurdueUniversity,USA HuiLi XidianUniversity,China JianfengMa XidianUniversity,China GeneralChairs ZilongWang XidianUniversity,China YongYu Xi’anUniversityofPostsand Telecommunications,China ZonghuaZhang HuaweiFranceResearchCenter,France ProgramCo-chairs XiaofengChen XidianUniversity,China XinyiHuang FujianNormalUniversity,China MirosławKutyłowski WrocławUniversityofScienceandTechnology, Poland PublicityCo-chairs ChaoChen JamesCookUniversity,Australia DebiaoHe WuhanUniversity,China XiaoyuZhang XidianUniversity,China SteeringCommitteeChair YangXiang SwinburneUniversityofTechnology,Australia OrganizationCommitteeMembers ShichongTan XidianUniversity,China GuohuaTian XidianUniversity,China JiaojiaoWu XidianUniversity,China viii Organization ProgramCommittee ShaoyingCai HunanUniversity,China JiagengChen CentralChinaNormalUniversity,China RongmaoChen NationalUniversityofDefenseTechnology, China KaiChen ChineseAcademyofSciences,China JintaiDing UniversityofCincinnati,USA ChangyuDong NewcastleUniversity,UK StevenFurnell UniversityofNottingham,UK ShuaiHan ShanghaiJiaoTongUniversity,China SajadHomayoun TechnicalUniversityofDenmark,Denmark QiongHuang SouthChinaAgriculturalUniversity,China SokratisKatsikas NorwegianUniversityofScienceandTechnology, Norway JingweiLi UniversityofElectronicScienceandTechnology ofChina,China WenjuanLi TheHongKongPolytechnicUniversity,China JosephLiu MonashUniversity,Australia ShigangLiu SwinburneUniversityofTechnology,Australia XimengLiu FuzhouUniversity,China ShengliLiu ShanghaiJiaoTongUniversity,China JianLou XidianUniversity,China BoLuo UniversityofKansas,USA XiapuLuo TheHongKongPolytechnicUniversity,China XuMa QufuNormalUniversity,China YuantianMiao SwinburneUniversityofTechnology,Australia JiantingNing FujianNormalUniversity,China LeiPan SwinburneUniversityofTechnology,Australia JavierParra-Arnau UniversitatPolitècnicadeCatalunya,Spain GerardoPelosi PolitecnicodiMilano,Italy SaiyuQi Xi’anJiaotongUniversity,China SeonghanShin NationalInstituteofAdvancedIndustrialScience andTechnology,Japan SiweiSun UniversityofChineseAcademyofSciences, China Hung-MinSun NationalTsingHuaUniversity,China Shi-FengSun ShanghaiJiaoTongUniversity,China ZhiyuanTan EdinburghNapierUniversity,UK HaiboTian SunYat-senUniversity,China ZhiboWang ZhejiangUniversity,China DingWang PekingUniversity,China Organization ix YunlingWang Xi’anUniversityofPostsand Telecommunications,China WeiWang BeijingJiaotongUniversity,China JianfengWang XidianUniversity,China JianghongWei InformationEngineeringUniversity,China LifeiWei ShanghaiOceanUniversity,China QianhongWu BeihangUniversity,China LiXu FujianNormalUniversity,China LeiXue TheHongKongPolytechnicUniversity,China GuominYang UniversityofWollongong,Australia Wun-SheYap UniversitiTunkuAbdulRahman,Malaysia Kuo-HuiYeh NationalDongHwaUniversity,China XingliangYuan MonashUniversity,Australia Zhi-HuiZhan SouthChinaUniversityofTechnology,China LeiZhang EastChinaNormalUniversity,China Contents CryptographyanditsApplications Improved(t,n)-ThresholdProxySignatureScheme ......................... 3 YaodongZhangandFengLiu AlgorithmSubstitutionAttacksonIdentity-BasedEncryption ................ 15 YifeiWang,YuliangLin,YiWang,WeiPeng,andLinLiu AuthenticatedContinuousTop-k SpatialKeywordSearchonDynamic Objects .............................................................. 32 YetneberkZenebeMelesew,JiayiLi,andYinbinMiao EfficientAttribute-BasedProxyRe-encryptionforSecureDeduplication ...... 52 TaoZhang,ChenWang,andMulmediyageImanthaUdanaChandrasena A Secure Word Vector Training Scheme Based on Inner-Product FunctionalEncryption .................................................. 65 MingwuZhang,Zhen-AnLi,andPeihangZhang D2DAuthenticationSchemeforIoT-enabledSmartHome .................. 83 QingruMa,TianqiZhou,andHaowenTan InnerProductEncryptionfromMiddle-ProductLearningwithErrors ......... 94 NiaoYang,ShaojunYang,YongZhao,andWeiWu NetworkSecurityandPrivacyProtection PubliclyVerifiablePrivateSetIntersectionfromHomomorphicEncryption .... 117 YutingJiang,JianghongWei,andJingPan SecureAsynchronousFederatedLearningforEdgeComputingDevices ....... 138 DayuCao,YinghuiZhang,WeiLiu,andXuanniWei FedBC:AnEfficientandPrivacy-PreservingFederatedConsensusScheme .... 148 MengfanXuandXinghuaLi ASecureandPrivacy-PreservingAuthenticationSchemeinIoMT ............ 163 YuxiangZhou, HaowenTan, andKarunarathinaChandrathilakaAppuhamilageAsiriaIroshan

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.