Abstract is missing.
- Efficient Threshold Secret Sharing Schemes Secure Against Rushing CheatersAvishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu. 3-23 [doi]
- Dynamic and Verifiable Hierarchical Secret SharingGiulia Traverso, Denise Demirel, Johannes A. Buchmann. 24-43 [doi]
- Computational Security of Quantum EncryptionGorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner, Michael St. Jules. 47-71 [doi]
- Efficient Simulation for Quantum Message AuthenticationAnne Broadbent, Evelyn Wainewright. 72-91 [doi]
- Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual CryptographyPaolo D'Arco, Roberto De Prisco, Yvo Desmedt. 95-113 [doi]
- Revisiting the False Acceptance Rate Attack on Biometric Visual Cryptographic SchemesKoray Karabina, Angela Robinson. 114-125 [doi]
- Detecting Algebraic Manipulation in Leaky Storage SystemsFuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang. 129-150 [doi]
- Cheater Detection in SPDZ Multiparty ComputationGabriele Spini, Serge Fehr. 151-176 [doi]
- Error-Correcting Codes Against Chosen-Codeword AttacksKenji Yasunaga. 177-189 [doi]
- Efficient Generic Zero-Knowledge Proofs from Commitments (Extended Abstract)Samuel Ranellucci, Alain Tapp, Rasmus Winther Zakarias. 190-212 [doi]
- Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and RobustnessYohei Watanabe 0001, Goichiro Hanaoka, Junji Shikata. 213-237 [doi]
- A Practical Fuzzy Extractor for Continuous FeaturesVladimir P. Parente, Jeroen van de Graaf. 241-258 [doi]
- Almost Perfect Privacy for Additive Gaussian Privacy FiltersShahab Asoodeh, Fady Alajaji, Tamás Linder. 259-278 [doi]
- A Better Chain Rule for HILL Pseudoentropy - Beyond Bounded LeakageMaciej Skórski. 279-299 [doi]