Abstract is missing.
- Fast, Compact, and Expressive Attribute-Based EncryptionJunichi Tomida, Yuto Kawahara, Ryo Nishimaki. 3-33 [doi]
- Adaptive Simulation Security for Inner Product Functional EncryptionShweta Agrawal, Benoît Libert, Monosij Maitra, Radu Titiu. 34-64 [doi]
- Verifiable Inner Product Encryption SchemeNajmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan. 65-94 [doi]
- A New Paradigm for Public-Key Functional Encryption for Degree-2 PolynomialsRomain Gay. 95-120 [doi]
- Master-Key KDM-Secure IBE from PairingsSanjam Garg, Romain Gay, Mohammad Hajiabadi. 123-152 [doi]
- Hierarchical Identity-Based Encryption with Tight Multi-challenge SecurityRoman Langrehr, Jiaxin Pan. 153-183 [doi]
- The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOThomas Agrikola, Geoffroy Couteau, Dennis Hofheinz. 187-219 [doi]
- Witness Maps and ApplicationsSuvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs. 220-246 [doi]
- Memory-Tight Reductions for Practical Key Encapsulation MechanismsRishiraj Bhattacharyya. 249-278 [doi]
- Toward RSA-OAEP Without Random OraclesNairen Cao, Adam O'Neill, Mohammad-Zaheri. 279-308 [doi]
- Public-Key Puncturable Encryption: Modular and Compact ConstructionsShifeng Sun, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu. 309-338 [doi]
- Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol FrameworkBenjamin Dowling, Paul Rösler, Jörg Schwenk. 341-373 [doi]
- Limits on the Efficiency of (Ring) LWE Based Non-interactive Key ExchangeSiyao Guo, Pritish Kamath, Alon Rosen, Katerina Sotiraki. 374-395 [doi]
- PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard ModelShaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen, Huaxiong Wang. 396-427 [doi]
- Constraining and Watermarking PRFs from Milder AssumptionsChris Peikert, Sina Shiehian. 431-461 [doi]
- Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-HashesDavid Derler, Kai Samelin, Daniel Slamanig. 462-492 [doi]
- Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based CryptographyCarsten Baum, Ariel Nof. 495-526 [doi]
- Updateable Inner Product Argument with Logarithmic Verifier and ApplicationsVanesa Daza, Carla Ràfols, Alexandros Zacharakis. 527-557 [doi]
- On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation SoundnessMasayuki Abe, Miguel Ambrona, Miyako Ohkubo. 558-589 [doi]
- On QA-NIZK in the BPK ModelBehzad Abdolmaleki, Helger Lipmaa, Janno Siim, Michal Zajac 0001. 590-620 [doi]
- Improved Discrete Gaussian and Subgaussian Analysis for Lattice CryptographyNicholas Genise, Daniele Micciancio, Chris Peikert, Michael Walter 0001. 623-651 [doi]
- Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and MoreQiqi Lai, Feng-Hao Liu, Zhedong Wang. 652-681 [doi]