Abstract is missing.
- Provably Secure Self-Extractable EncryptionZhi Liang, Qianhong Wu, Weiran Liu, Jianwei Liu, Fu Xiao. 3-23 [doi]
- Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast DecryptionYunling Wang, Jianfeng Wang, Shi-Feng Sun, Joseph K. Liu, Willy Susilo, Xiaofeng Chen 0001. 24-38 [doi]
- An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order GroupsRu Meng, Yanwei Zhou, Jianting Ning, Kaitai Liang, Jinguang Han, Willy Susilo. 39-56 [doi]
- Secure Multi-label Classification over Encrypted Data in CloudYang Liu, Xingxin Li, Youwen Zhu, Jian Wang, Zhe Liu. 57-73 [doi]
- A Secure Cloud Backup System with Deduplication and Assured DeletionJunzuo Lai, Jie Xiong, Chuansheng Wang, Guangzheng Wu, Yanling Li. 74-83 [doi]
- Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate SignaturesGunnar Hartung, Björn Kaidel, Alexander Koch 0001, Jessica Koch, Dominik Hartmann. 87-106 [doi]
- Verifiably Encrypted Group SignaturesZhen Wang, Xiling Luo, Qianhong Wu. 107-126 [doi]
- Deniable Ring Authentication Based on Projective Hash FunctionsShengke Zeng, Yi Mu, Guomin Yang, Mingxing He. 127-143 [doi]
- INT-RUP Security of Checksum-Based Authenticated EncryptionPing Zhang, Peng Wang, Honggang Hu, Changsong Cheng, Wenke Kuai. 147-166 [doi]
- Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage SettingSuvradip Chakraborty, Janaka Alawatugoda, C. Pandu Rangan. 167-187 [doi]
- New Framework of Password-Based Authenticated Key Exchange from Only-One Lossy EncryptionHaiyang Xue, Bao Li, Jingnan He. 188-198 [doi]
- Impossibility of the Provable Security of the Schnorr Signature from the One-More DL Assumption in the Non-programmable Random Oracle ModelMasayuki Fukumitsu, Shingo Hasegawa. 201-218 [doi]
- Bit Security of the Hyperelliptic Curves Diffie-Hellman ProblemFangguo Zhang. 219-235 [doi]
- Natural sd-RCCA Secure Public-Key EncryptionsYuan Chen, Qingkuan Dong, Qiqi Lai. 236-250 [doi]
- Long-Term Secure Time-Stamping Using Preimage-Aware Hash Functions - (Short Version)Ahto Buldas, Matthias Geihs, Johannes A. Buchmann. 251-260 [doi]
- On the Hardness of Sparsely Learning Parity with NoiseHanlin Liu, Di Yan, Yu Yu, Shuoyao Zhao. 261-267 [doi]
- Provable Secure Post-Quantum Signature Scheme Based on Isomorphism of Polynomials in Quantum Random Oracle ModelBagus Santoso, Chunhua Su. 271-284 [doi]
- Bootstrapping Fully Homomorphic Encryption with Ring Plaintexts Within Polynomial NoiseLong Chen, Zhenfeng Zhang. 285-304 [doi]
- Revocable Predicate Encryption from LatticesSan Ling, Khoa Nguyen, Huaxiong Wang, Juanyang Zhang. 305-326 [doi]
- Provable Secure Constructions for Broadcast Encryption with Personalized MessagesKamalesh Acharya, Ratna Dutta. 329-348 [doi]
- Provably Secure Homomorphic SigncryptionFatemeh Rezaeibagha, Yi Mu, Shiwei Zhang, Xiaofen Wang. 349-360 [doi]
- Public-Key Encryption with Simulation-Based Sender Selective-Opening SecurityDali Zhu, Renjun Zhang, Dingding Jia. 361-380 [doi]
- Homomorphic Secret Sharing from Paillier EncryptionNelly Fazio, Rosario Gennaro, Tahereh Jafarikhah, William E. Skeith III. 381-399 [doi]
- Fuzzy Public-Key Encryption Based on Biometric DataHui Cui, Man Ho Au, Baodong Qin, Robert H. Deng, Xun Yi. 400-409 [doi]
- An Efficient Certificateless Proxy Re-Encryption Scheme Without PairingS. Sharmila Deva Selvi, Arinjita Paul, Chandrasekaran Pandu Rangan. 413-433 [doi]
- Mergeable Functional EncryptionVincenzo Iovino, Karol Zebrowski. 434-451 [doi]
- Private Subgraph Matching ProtocolZifeng Xu, Fucai Zhou, Yuxi Li, Jian Xu, Qiang Wang. 455-470 [doi]
- A New Blockchain-Based Value-Added Tax SystemDimaz Ankaa Wijaya, Joseph K. Liu, Dony Ariadi Suwarsono, Peng Zhang 0029. 471-486 [doi]
- Verifiable Private Polynomial EvaluationXavier Bultel, Manik Lal Das, Hardik Gajera, David Gérault, Matthieu Giraud, Pascal Lafourcade 0001. 487-506 [doi]