Abstract is missing.
- Optimal Structure-Preserving SignaturesJens Groth. 1 [doi]
- Secure Composition of Cryptographic ProtocolsVipul Goyal. 2 [doi]
- Secure Two-Party Computation over a Z-ChannelPaolo Palmieri, Olivier Pereira. 3-15 [doi]
- Precise Time and Space Simulatable Zero-KnowledgeNing Ding, Dawu Gu. 16-33 [doi]
- Weak Oblivious Transfer from Strong One-Way FunctionsKeisuke Tanaka, Akihiro Yamada, Kenji Yasunaga. 34-51 [doi]
- Simulatable Adaptive Oblivious Transfer with Statistical Receiver's PrivacyBingsheng Zhang. 52-67 [doi]
- Verifiable Security of Boneh-Franklin Identity-Based EncryptionGilles Barthe, Federico Olmedo, Santiago Zanella Béguelin. 68-83 [doi]
- Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-CostCheng Chen, Zhenfeng Zhang, Dengguo Feng. 84-101 [doi]
- Fully Distributed Broadcast EncryptionQianhong Wu, Bo Qin, Lei Zhang 0009, Josep Domingo-Ferrer. 102-119 [doi]
- Efficient Identity-Based Signcryption in the Standard ModelFagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi. 120-137 [doi]
- Toward Compact Public Key Encryption Based on CDH Assumption via Extended Twin DH AssumptionYoshikazu Hanatani, Hirofumi Muratani, Tomoko Yonemura. 138-153 [doi]
- Anonymous Encryption with Partial-Order Subset Delegation FunctionalityMingwu Zhang, Takashi Nishide, Bo Yang 0003, Tsuyoshi Takagi. 154-169 [doi]
- Concurrent Signatures with Fully Negotiable Binding ControlTsz Hon Yuen, Duncan S. Wong, Willy Susilo, Qiong Huang. 170-187 [doi]
- Secure Obfuscation of Encrypted Verifiable Encrypted SignaturesRong Cheng, Bo Zhang, Fangguo Zhang. 188-203 [doi]
- Identity-Based Trace and Revoke SchemesDuong Hieu Phan, Viet Cuong Trinh. 204-221 [doi]
- Universally Composable Private Proximity TestingRafael Tonicelli, Bernardo Machado David, Vinícius de Morais Alves. 222-239 [doi]
- Generic Constant-Round Oblivious Sorting Algorithm for MPCBingsheng Zhang. 240-256 [doi]
- General Construction of Chameleon All-But-One Trapdoor FunctionsShengli Liu, Junzuo Lai, Robert H. Deng. 257-265 [doi]
- PolyE+CTR: A Swiss-Army-Knife Mode for Block CiphersLiting Zhang, Wenling Wu, Peng Wang. 266-280 [doi]
- Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher ModelYusuke Naito, Kazuki Yoneyama, Lei Wang 0007, Kazuo Ohta. 281-296 [doi]
- Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential SharingXianhui Lu, Bao Li, Qixiang Mei, Haixia Xu. 297-308 [doi]
- Randomness Leakage in the KEM/DEM FrameworkHitoshi Namiki, Keisuke Tanaka, Kenji Yasunaga. 309-323 [doi]
- Generalized Learning Problems and Applications to Non-commutative CryptographyGilbert Baumslag, Nelly Fazio, Antonio Nicolosi, Vladimir Shpilrain, William E. Skeith III. 324-339 [doi]
- A Novel Framework for Protocol AnalysisKristian Gjøsteen, George Petrides, Asgeir Steine. 340-347 [doi]
- Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation LeakageKazuki Yoneyama, Yunlei Zhao. 348-365 [doi]
- Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger SecurityFushan Wei, Chuangui Ma, Zhenfeng Zhang. 366-379 [doi]
- TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap AssumptionJiaxin Pan, Libin Wang. 380-388 [doi]
- Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward SecurityHai Huang. 389-397 [doi]