1635 | -- | 1637 | Shaoquan Jiang, Tsuyoshi Takagi, Guilin Wang. Special issue on provable security |
1638 | -- | 1649 | Mingwu Zhang, Bo Yang 0003. Continual key leakage tolerant encryption from extensible set delegation |
1650 | -- | 1662 | Sree Vivek Sivanandam, S. Sharmila Deva Selvi, Akshayaram Srinivasan, Chandrasekaran Pandu Rangan. Stronger public key encryption system withstanding RAM scraper like attacks |
1663 | -- | 1675 | Yutaka Kawai, Goichiro Hanaoka, Kazuo Ohta, Noboru Kunihiro. A limitation on security evaluation of cryptographic primitives with fixed keys |
1676 | -- | 1697 | Yoshikazu Hanatani, Goichiro Hanaoka, Takahiro Matsuda 0002, Takashi Yamakawa. Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models |
1698 | -- | 1716 | Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao. Generalized (identity-based) hash proof system and its applications |
1717 | -- | 1725 | Takanori Suga, Takashi Nishide, Kouichi Sakurai. Character-based symmetric searchable encryption and its implementation and experiment on mobile devices |
1726 | -- | 1736 | Yoshinao Uchide, Noboru Kunihiro. Searchable symmetric encryption capable of searching for an arbitrary string |
1737 | -- | 1747 | Mingwu Zhang, Yi Mu, Jian Shen, Xinyi Huang. Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity |
1748 | -- | 1758 | Suqing Lin, Rui Zhang 0002, Mingsheng Wang. Verifiable attribute-based proxy re-encryption for secure public cloud data sharing |
1759 | -- | 1768 | Mohsen Alimomeni, Reihaneh Safavi-Naini. Two-level security for message sequences |
1769 | -- | 1785 | David Nuñez, Isaac Agudo, Javier Lopez. On the application of generic CCA-secure transformations to proxy re-encryption |
1786 | -- | 1795 | Satsuya Ohata, Kanta Matsuura. Proxy re-encryption via indistinguishability obfuscation |
1796 | -- | 1809 | Dennis Y. W. Liu, Duncan S. Wong. One-move convertible nominative signature in the standard model |
1810 | -- | 1819 | Shengke Zeng, Qinyi Li, Zhiguang Qin, Qing Lu. Non-interactive deniable ring signature without random oracles |
1820 | -- | 1828 | Haibo Tian, Fangguo Zhang, Baodian Wei. A lattice-based partially blind signature |
1829 | -- | 1842 | Yuyu Wang, Keisuke Tanaka. Generic transformations for existentially unforgeable signature schemes in the bounded leakage model |
1843 | -- | 1863 | Yanfei Guo, Zhenfeng Zhang. Authenticated key exchange with entities from different settings and varied groups |
1864 | -- | 1871 | Teng Wu, Guang Gong. Two new message authentication codes based on APN functions and stream ciphers |