Abstract is missing.
- Packed Ciphertexts in LWE-Based Homomorphic EncryptionZvika Brakerski, Craig Gentry, Shai Halevi. 1-13 [doi]
- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic EncryptionJonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou. 14-31 [doi]
- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key EncryptionKeita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda 0002, Shota Yamada. 32-50 [doi]
- Functional Encryption: Origins and Recent DevelopmentsBrent Waters. 51-54 [doi]
- Vector Commitments and Their ApplicationsDario Catalano, Dario Fiore. 55-72 [doi]
- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSSeung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou. 73-88 [doi]
- Cryptography Using Captcha PuzzlesAbishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia. 89-106 [doi]
- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsSan Ling, Khoa Nguyen, Damien Stehlé, Huaxiong Wang. 107-124 [doi]
- Decentralized Attribute-Based SignaturesTatsuaki Okamoto, Katsuyuki Takashima. 125-142 [doi]
- On the Semantic Security of Functional Encryption SchemesManuel Barbosa, Pooya Farshim. 143-161 [doi]
- Attribute-Based Encryption with Fast DecryptionSusan Hohenberger, Brent Waters. 162-179 [doi]
- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and ErrorsNoboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu. 180-197 [doi]
- Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public?Guillaume Barbu, Alberto Battistello, Guillaume Dabosville, Christophe Giraud, Guénaël Renault, Soline Renner, Rina Zeitoun. 198-215 [doi]
- Revocable Identity-Based Encryption Revisited: Security Model and ConstructionJae Hong Seo, Keita Emura. 216-234 [doi]
- Improved (Hierarchical) Inner-Product Encryption from LatticesKeita Xagawa. 235-252 [doi]
- Techniques for Efficient Secure Computation Based on Yao's ProtocolYehuda Lindell. 253 [doi]
- Non-Interactive Key ExchangeEduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson. 254-271 [doi]
- Efficient UC-Secure Authenticated Key-Exchange for Algebraic LanguagesFabrice Ben Hamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud. 272-291 [doi]
- Tighter Reductions for Forward-Secure Signature SchemesMichel Abdalla, Fabrice Ben Hamouda, David Pointcheval. 292-311 [doi]
- Tagged One-Time Signatures: Tight Security and Optimal Tag SizeMasayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo. 312-331 [doi]
- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, RevisitedTakahiro Matsuda 0002, Goichiro Hanaoka. 332-351 [doi]
- Robust Encryption, RevisitedPooya Farshim, Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia. 352-368 [doi]
- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks RevisitedZhengan Huang, Shengli Liu, Baodong Qin. 369-385 [doi]
- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic SignaturesNuttapong Attrapadung, Benoît Libert, Thomas Peters. 386-404 [doi]
- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VESRyo Nishimaki, Keita Xagawa. 405-422 [doi]
- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation StudiesKwangsu Lee, Dong-Hoon Lee, Moti Yung. 423-442 [doi]
- New Constructions and Applications of Trapdoor DDH GroupsYannick Seurin. 443-460 [doi]
- Rate-Limited Secure Function Evaluation: Definitions and ConstructionsÖzgür Dagdelen, Payman Mohassel, Daniele Venturi. 461-478 [doi]
- Verifiable Elections That Scale for FreeMelissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn. 479-496 [doi]
- On the Connection between Leakage Tolerance and Adaptive SecurityJesper Buus Nielsen, Daniele Venturi, Angela Zottarel. 497-515 [doi]