Abstract is missing.
- Registered ABE and Adaptively-Secure Broadcast Encryption from Succinct LWEJeffrey Champion, Yao Ching Hsieh, David J. Wu 0001. 3-34 [doi]
- PKE and ABE with Collusion-Resistant Secure Key LeasingFuyuki Kitagawa, Ryo Nishimaki, Nikhil Pappu. 35-68 [doi]
- Efficiently-Thresholdizable Batched Identity Based Encryption, with ApplicationsAmit Agarwal, Rex Fernando, Benny Pinkas. 69-100 [doi]
- A Note on Adaptive Security in Hierarchical Identity-Based EncryptionRishab Goyal, Venkata Koppula, Mahesh Sreekumar Rajasree. 101-136 [doi]
- Dynamic Bounded-Collusion Streaming Functional Encryption from Minimal AssumptionsKaartik Bhushan, Alexis Korb, Amit Sahai. 137-169 [doi]
- Tightly Secure Inner-Product Functional Encryption Revisited: Compact, Lattice-Based, and MoreShuai Han 0001, Hongxu Yi, Shengli Liu 0001, Dawu Gu. 170-203 [doi]
- Unbounded Distributed Broadcast Encryption and Registered ABE from Succinct LWEHoeteck Wee, David J. Wu 0001. 204-235 [doi]
- Key-Homomorphic Computations for RAM: Fully Succinct Randomised Encodings and MoreDamiano Abram, Giulio Malavolta, Lawrence Roy. 236-268 [doi]
- Resolving the Efficiency-Utility Dilemma of Threshold Linearly Homomorphic Encryption via Message-Space AdapterYijia Chang, Rongmao Chen, Chao Lin, Songze Li, Xinyi Huang 0001. 269-303 [doi]
- General Functional Bootstrapping Using CKKSAndreea Alexandru, Andrey Kim, Yuriy Polyakov. 304-337 [doi]
- Homomorphic Encryption for Large Integers from Nested Residue Number SystemsDan Boneh, Jaehyung Kim. 338-370 [doi]
- Fully Homomorphic Encryption with Chosen-Ciphertext Security from LWERupeng Yang, Zuoxia Yu, Willy Susilo. 371-405 [doi]
- Sometimes-Decryptable Homomorphic Encryption from Sub-exponential DDHAbhishek Jain 0002, Zhengzhong Jin. 406-439 [doi]
- Anamorphic-Resistant Encryption; Or Why the Encryption Debate is Still AliveYevgeniy Dodis, Eli Goldin. 440-471 [doi]
- Anamorphic Resistant Encryption: the Good, the Bad and the UglyDavide Carnemolla, Dario Catalano, Emanuele Giunta, Francesco Migliaro. 472-503 [doi]
- A Framework for Witness Encryption from Linearly Verifiable SNARKs and ApplicationsSanjam Garg, Mohammad Hajiabadi, Dimitris Kolonelos, Abhiram Kothapalli, Guru-Vamsi Policharla. 504-539 [doi]
- Verifiable Decapsulation: Recognizing Faulty Implementations of Post-quantum KEMsLewis Glabush, Felix Günther 0001, Kathrin Hövelmanns, Douglas Stebila. 543-574 [doi]
- Hybrid Obfuscated Key Exchange and KEMsFelix Günther 0001, Michael Rosenberg, Douglas Stebila, Shannon Veitch. 575-609 [doi]
- How to Tolerate Typos in Strong Asymmetric PAKEIan McQuoid, Mike Rosulek, Jiayu Xu 0001. 610-641 [doi]
- Asymptotically Optimal Adaptive Asynchronous Common Coin and DKG with Silent SetupHanwen Feng 0001, Qiang Tang 0005. 642-675 [doi]