Abstract is missing.
- Leakage Resilient Cheating Detectable Secret Sharing SchemesSabyasachi Dutta, Reihaneh Safavi-Naini. 3-23 [doi]
- Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRFTapas Pal, Ratna Dutta. 24-45 [doi]
- Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and MoreBehzad Abdolmaleki, Daniel Slamanig. 46-67 [doi]
- Small Superset and Big Subset ObfuscationSteven D. Galbraith, Trey Li. 68-87 [doi]
- Algebraic Attacks on Round-Reduced KeccakFukang Liu, Takanori Isobe 0001, Willi Meier, Zhonghao Yang. 91-110 [doi]
- On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear LayersMuhammad ElSheikh, Amr M. Youssef. 111-131 [doi]
- Constructions of Iterative Near-MDS Matrices with the Lowest XOR CountXiaodan Li, Wenling Wu. 132-150 [doi]
- Forced Independent Optimized Implementation of 4-Bit S-BoxYanhong Fan, Weijia Wang, Zhihu Li, Zhenyu Lu, Siu-Ming Yiu, Meiqin Wang. 151-170 [doi]
- Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-VJin Hoki, Takanori Isobe 0001, Ryoma Ito 0001, Fukang Liu, Kosei Sakamoto. 171-190 [doi]
- Broadcast Authenticated Encryption with Keyword SearchXueqiao Liu, Kai He, Guomin Yang, Willy Susilo, Joseph Tonien, Qiong Huang. 193-213 [doi]
- An Anonymous Trace-and-Revoke Broadcast Encryption SchemeOlivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehlé. 214-233 [doi]
- Security Analysis of End-to-End Encryption for Zoom MeetingsTakanori Isobe 0001, Ryoma Ito 0001. 234-253 [doi]
- CCA Secure Attribute-Hiding Inner Product Encryption from Minimal AssumptionTapas Pal, Ratna Dutta. 254-274 [doi]
- Optimal Randomized Partial Checking for Decryption Mix NetsThomas Haines, Johannes Müller 0001. 277-292 [doi]
- A Novel Proof of Shuffle: Exponentially Secure Cut-and-ChooseThomas Haines, Johannes Müller 0001. 293-308 [doi]
- Private Decision Tree Evaluation with Constant Rounds via (Only) Fair SS-4PCHikaru Tsuchida, Takashi Nishide. 309-329 [doi]
- Partially-Fair Computation from Timed-Release Encryption and Oblivious TransferGeoffroy Couteau, A. W. Roscoe 0001, Peter Y. A. Ryan. 330-349 [doi]
- Concise Mercurial Subvector Commitments: Definitions and ConstructionsYannan Li, Willy Susilo, Guomin Yang, Tran Viet Xuan Phuong, Yong Yu 0002, Dongxi Liu. 353-371 [doi]
- A Secure Cross-Shard View-Change Protocol for Sharding BlockchainsYizhong Liu, Jianwei Liu 0001, Yiming Hei, Yu Xia, Qianhong Wu. 372-390 [doi]
- Efficient Unique Ring Signature for Blockchain Privacy ProtectionAnh The Ta, Thanh Xuan Khuc, Tuong Ngoc Nguyen, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto. 391-407 [doi]
- Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABEZongyang Zhang, Tong Li, Zhuo Wang, Jianwei Liu 0001. 408-429 [doi]
- Transparency or Anonymity Leak: Monero Mining Pools Data PublicationDimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu. 433-450 [doi]
- Mind the Scraps: Attacking Blockchain Based on SelfdestructWei-Yang Chiu, Weizhi Meng 0001. 451-469 [doi]
- A Blockchain-Enabled Federated Learning Model for Privacy Preservation: System DesignMinfeng Qi, Ziyuan Wang, Fan Wu, Rob Hanson, Shiping Chen 0001, Yang Xiang 0001, Liming Zhu. 473-489 [doi]
- ALRS: An Adversarial Noise Based Privacy-Preserving Data Sharing MechanismJikun Chen, Ruoyu Deng, Hongbin Chen, Na Ruan, Yao Liu, Chao Liu, Chunhua Su. 490-509 [doi]
- Non-interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving LearningCarlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa. 510-528 [doi]
- Towards Visualizing and Detecting Audio Adversarial Examples for Automatic Speech RecognitionWei Zong, Yang-Wai Chow, Willy Susilo. 531-549 [doi]
- Oriole: Thwarting Privacy Against Trustworthy Deep Learning ModelsLiuqiao Chen, Hu Wang, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian. 550-568 [doi]
- Puncturable Identity-Based Encryption from LatticesPriyanka Dutta, Willy Susilo, Dung Hoang Duong, Partha Sarathi Roy 0001. 571-589 [doi]
- Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-Based GSW-FHEChao Liu, Anyu Wang 0003, Zhongxiang Zheng. 590-609 [doi]
- Forward-Secure Group Encryptions from LatticesJing Pan, Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo. 610-629 [doi]
- Anonymous Lattice Identity-Based Encryption with Traceable IdentitiesXavier Boyen, Ernest Foo, Qinyi Li. 630-649 [doi]
- Lattice-Based Secure Biometric Authentication for Hamming DistanceJung Hee Cheon, Dongwoo Kim 0003, Duhyeong Kim, Joohee Lee, Junbum Shin, Yongsoo Song. 653-672 [doi]
- A Trustless GQ Multi-signature Scheme with Identifiable AbortHandong Cui, Tsz Hon Yuen. 673-693 [doi]
- +Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver. 694-714 [doi]