Abstract is missing.
- Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in CloudLi Kang, Leyou Zhang. 3-18 [doi]
- Anonymous Leakage-Resilient Ciphertext-Policy Attribute-Based Encryption Supporting Direct RevocationXiaoxu Gao, Leyou Zhang, Gongcheng Hu. 21-35 [doi]
- Cryptographic Reverse Firewalls for Identity-Based EncryptionYuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li. 36-52 [doi]
- Identity-Based Encryption Resilient to Continual Leakage Without Random OraclesYuyan Guo, Mingming Jiang, Shimin Wei, Ming Xie, Mei Sun. 53-64 [doi]
- CLIBDA: A Deniable Authentication Scheme for Pervasive Computing EnvironmentEmmanuel Ahene, Yuanfeng Guan, Zhiwei Zhang, Fagen Li. 67-83 [doi]
- Leveled Lattice-Based Linearly Homomorphic Signature Scheme in the Standard Model for Network CodingFenghe Wang, Shaoquan Shi, Chunxiao Wang. 84-94 [doi]
- Symmetric Lattice-Based PAKE from Approximate Smooth Projective Hash Function and Reconciliation MechanismZilong Wang, Honggang Hu, Mengce Zheng, Jiehui Nan. 95-106 [doi]
- Zero-Knowledge Proofs for Improved Lattice-Based Group Signature Scheme with Verifier-Local RevocationYanhua Zhang, Yifeng Yin, Ximeng Liu, Qikun Zhang, Huiwen Jia. 107-127 [doi]
- Post-Quantum Pseudorandom Functions from Mersenne PrimesJiehui Nan, Mengce Zheng, Honggang Hu. 128-142 [doi]
- An Efficient Proxy Re-Signature Over LatticesMingming Jiang, Jinqiu Hou, Yuyan Guo, Yan Wang, Shimin Wei. 145-160 [doi]
- Batch Verification of Linkable Ring Signature in Smart GridQiyu Wang, Jie Chen, Lishuang Zhuang. 161-176 [doi]
- Hierarchical Identity-Based Signature over Verifiable Random FunctionJuan Ren, Leyou Zhang. 177-189 [doi]
- Analysis of Ciphertext Policy Hidden Attribute-Based Encryption and Its Improved MethodGongcheng Hu, Leyou Zhang. 193-208 [doi]
- Implementing Attacks on the Approximate Greatest Common Divisor ProblemLeizhang Wang, Quanbo Qu, Tuoyan Li, Yange Chen. 209-227 [doi]
- M4D: A Malware Detection Method Using Multimodal FeaturesYusheng Dai, Hui Li, Xing Rong, Yahong Li, Min Zheng. 228-238 [doi]
- New Key Recovery Attack on the MICKEY Family of Stream CiphersLin Ding 0001, Dawu Gu, Lei Wang 0031. 239-249 [doi]
- A General Construction for Password-Based Authenticated Key Exchange from Witness PRFsJiehui Nan, Mengce Zheng, Zilong Wang, Honggang Hu. 253-267 [doi]
- Certificateless Authenticated Key Agreement for Decentralized WBANsMwitende Gervais, Liang Sun, Ke Wang, Fagen Li. 268-290 [doi]
- A Certificateless Proxy Re-encryption Scheme for Cloud-Based BlockchainNabeil Eltayieb, Liang Sun, Ke Wang, Fagen Li. 293-307 [doi]
- A Novel Fair and Verifiable Data Trading SchemeHaiyong Yu, Juntao Gao, Tong Wu, Xuelian Li. 308-326 [doi]
- Public Audit Scheme of Shared Data Based on BlockchainJunfeng Tian, Xuan Jing, Ruifang Guo. 327-344 [doi]
- A Hybrid Key Management Scheme for Wireless Sensor NetworkYanyan Han, Yanru He, Peihe Liu, Xiaoxuan Yan, Na Li. 347-364 [doi]