Abstract is missing.
- Tools over Bilinear Groups for Modular Design of Cryptographic TasksMasayuki Abe. 1 [doi]
- One-Move Convertible Nominative Signature in the Standard ModelDennis Y. W. Liu, Duncan S. Wong. 2-20 [doi]
- Efficient and Random Oracle-Free Conditionally Anonymous Ring SignatureShengke Zeng, Zhiguang Qin, Qing Lu, Qinyi Li. 21-34 [doi]
- ID Based Signcryption Scheme in Standard ModelS. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan. 35-52 [doi]
- Combined Public-Key Schemes: The Case of ABE and ABSCheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng. 53-69 [doi]
- Several Weak Bit-Commitments Using Seal-Once Tamper-Evident DevicesIoana Boureanu, Serge Vaudenay. 70-87 [doi]
- Deterministic Random OraclesMargus Niitsoo. 88-103 [doi]
- On the (Non-)Equivalence of UC Security NotionsOana Ciobotaru. 104-124 [doi]
- LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set DelegationBo Yang 0003, Mingwu Zhang. 125-142 [doi]
- Anonymous Identity-Based Hash Proof System and Its ApplicationsYu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao. 143-160 [doi]
- Efficient Escrow-Free Identity-Based SignatureYunmei Zhang, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo. 161-174 [doi]
- Perfect Keyword Privacy in PEKS SystemsMototsugu Nishioka. 175-192 [doi]
- Efficient Fully Secure Attribute-Based Encryption Schemes for General Access StructuresTapas Pandit, Rana Barua. 193-214 [doi]
- Symmetric Inner-Product Predicate Encryption Based on Three GroupsMasayuki Yoshino, Noboru Kunihiro, Ken Naganuma, Hisayoshi Sato. 215-234 [doi]
- Secure Keyword Search Using Bloom Filter with Specified Character PositionsTakanori Suga, Takashi Nishide, Kouichi Sakurai. 235-252 [doi]
- Fully Secure Doubly-Spatial Encryption under Simple AssumptionsCheng Chen, Zhenfeng Zhang, Dengguo Feng. 253-263 [doi]
- Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random OraclesZheng Yang, Jörg Schwenk. 264-275 [doi]
- Authenticated Key Exchange with Entities from Different Settings and Varied GroupsYanfei Guo, Zhenfeng Zhang. 276-287 [doi]
- On Capabilities of Hash Domain Extenders to Preserve Enhanced Security PropertiesMohammad Reza Reyhanitabar, Willy Susilo. 288-299 [doi]
- Revisiting a Secret Sharing Approach to Network CodesZhaoHui Tang, Hoon Wei Lim, Huaxiong Wang. 300-317 [doi]
- Codes Based Tracing and Revoking Scheme with Constant CiphertextXingwen Zhao, Hui Li. 318-335 [doi]