Abstract is missing.
- Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsNuttapong Attrapadung. 3-35 [doi]
- CCA-Secure Inner-Product Functional Encryption from Projective Hash FunctionsFabrice Benhamouda, Florian Bourse, Helger Lipmaa. 36-66 [doi]
- Bounded-Collusion Attribute-Based Encryption from Minimal AssumptionsGene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich. 67-87 [doi]
- Access Control Encryption for Equality, Comparison, and MoreGeorg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi. 88-118 [doi]
- Deterring Certificate Subversion: Efficient Double-Authentication-Preventing SignaturesMihir Bellare, Bertram Poettering, Douglas Stebila. 121-151 [doi]
- Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable SignaturesJan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig. 152-182 [doi]
- Improved Structure Preserving Signatures Under Standard Bilinear AssumptionsCharanjit S. Jutla, Arnab Roy 0003. 183-209 [doi]
- Chosen-Ciphertext Secure Fully Homomorphic EncryptionRan Canetti, Srinivasan Raghuraman, Silas Richelson, Vinod Vaikuntanathan. 213-240 [doi]
- Circuit-Private Multi-key FHEWutichai Chongchitmate, Rafail Ostrovsky. 241-270 [doi]
- FHE over the Integers: Decomposed and Batched in the Post-Quantum RegimeDaniel Benarroch, Zvika Brakerski, Tancrède Lepoint. 271-301 [doi]
- Ceremonies for End-to-End Verifiable ElectionsAggelos Kiayias, Thomas Zacharias 0001, Bingsheng Zhang. 305-334 [doi]
- A Modular Security Analysis of EAP and IEEE 802.11Chris Brzuska, Håkon Jacobsen. 335-365 [doi]
- On the Computational Overhead of MPC with Dishonest MajorityJesper Buus Nielsen, Samuel Ranellucci. 369-395 [doi]
- Better Two-Round Adaptive Multi-party ComputationRan Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam. 396-427 [doi]
- Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware ModelCarmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam. 428-460 [doi]
- Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key DelegationPratish Datta, Ratna Dutta, Sourav Mukhopadhyay. 463-493 [doi]
- Constraining Pseudorandom Functions PrivatelyDan Boneh, Kevin Lewi, David J. Wu. 494-524 [doi]
- Universal Samplers with Fast VerificationVenkata Koppula, Andrew Poelstra, Brent Waters. 525-554 [doi]