Cryptography, Blockchain and Cloud Security.

Cryptography plays an essential role in ensuring many security properties required in data processing of various kinds. Blockchain is a distributed database maintained by all participants in a system, which is secured by cryptography and game theory. Blockchain has the following characteristics: decentralization, verifiability and immutability. They are disruptive technologies that impacts research, as well as industries. The advances of cryptography and blockchain technologies have contributed a great deal to change the way in traditional industries, ranging from finance to trade, manufacturing, and more. Cryptography and blockchain are also widely used in system security. The aim of this workshop is to publish high-quality papers with state-of-the-art solutions regarding cryptography and blockchain technologies to promote the adoption of the technologies in more areas.

Scope and Topics:

    Potential topics include but are not limited to:
  • Symmetric Cryptography
  • Public-Key Cryptography
  • Digital Signatures
  • Secure Protocols including authentication, key agreement etc
  • Post Quantum Cryptography
  • Zero-Knowledge
  • Secure Multiparty Computation
  • Game Theory and its Applications in Blockchain
  • Secure Storage Solutions based on Blockchain
  • Forensic issues based on Blockchain
  • Digital Currency based on Blockchain
  • Applications of Blockchain in Finance
  • Applications of Blockchain in IOT
  • Applications of Blockchain in Industry
  • Applications of Blockchain in Smart City/Smart Grid/Smart Home
  • Machine Learning for Blockchain
  • System Security based on Blockchain
  • Techniques of Secure Storage for Cloud Data
  • Security and Privacy in Cloud Computing
  • Security Evaluation and Benchmarks Based on Cloud
  • Authentication, Authorization and Reliability Issues in Cloud
  • Security Policy, Security Theory and Models Based on Big Data
  • Security, privacy and trust in Big data
  • Security and Privacy in IoT
  • Security and Privacy in System Security
  • Machine Learning for Security


Program Chairs:

Shouling Ji, Zhejiang University, China
Yu Jiang, Tsinghua University, China
Yongjun Ren, Nanjing University of Information Science & Technology, China
Weizhi Meng, Technical University of Denmark, Denmark
Chunhua Su, University of Aizu, Japan

Paper Submission:

Submission page: https://easychair.org/conferences/?conf=cbcs2021
Submitted papers should be original, unpublished work and not currently under review for any other conference or journal. Papers not following these guidelines will be rejected. all manuscripts should be formatted using the Springer-LNCS template, which can be found at https://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0.

    IMPORTANT DATES

  • Submission Deadline: May 21th, 2021(firm deadline)
  • Notification: May 24th, 2021
  • Camera-Ready Submission Date: May 27th, 2021