Abstract is missing.
- Identity-Concealed Authenticated Encryption from Ring Learning with ErrorsChao Liu, Zhongxiang Zheng, Keting Jia, Limin Tao. 3-18 [doi]
- Lattice-Based IBE with Equality Test in Standard ModelDung Hoang Duong, Huy Quoc Le, Partha Sarathi Roy 0001, Willy Susilo. 19-40 [doi]
- Password-Based Authenticated Key Exchange from Standard Isogeny AssumptionsShintaro Terada, Kazuki Yoneyama. 41-56 [doi]
- An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate SignatureKang Li, Man Ho Au, Wang Hei Ho, Yilei Wang. 59-76 [doi]
- History-Free Sequential Aggregate MAC RevisitedShoichi Hirose, Junji Shikata. 77-93 [doi]
- A Practical Lattice-Based Sequential Aggregate SignatureZhipeng Wang, Qianhong Wu. 94-109 [doi]
- Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword SearchXueqiao Liu, Hongbo Li, Guomin Yang, Willy Susilo, Joseph Tonien, Qiong Huang. 113-129 [doi]
- Space-Efficient and Secure Substring Searchable Symmetric Encryption Using an Improved DAWGHiroaki Yamamoto, Yoshihiro Wachi, Hiroshi Fujiwara. 130-148 [doi]
- Plaintext-Verifiably-Checkable EncryptionSha Ma, Qiong Huang, XiMing Li, Meiyan Xiao. 149-166 [doi]
- Hierarchical Functional Signcryption: Notion and ConstructionDongxue Pan, Bei Liang, Hongda Li, Peifang Ni. 167-185 [doi]
- A Critique of Game-Based Definitions of Receipt-Freeness for VotingAshley Fraser, Elizabeth A. Quaglia, Ben Smyth. 189-205 [doi]
- Improved Cryptanalysis of the KMOV Elliptic Curve CryptosystemAbderrahmane Nitaj, Willy Susilo, Joseph Tonien. 206-221 [doi]
- Solving ECDLP via List DecodingFangguo Zhang, Shengli Liu. 222-244 [doi]
- Provably Secure Proactive Secret Sharing Without the Adjacent AssumptionZhe Xia, Bo Yang 0003, Yanwei Zhou, Mingwu Zhang, Hua Shen, Yi Mu 0001. 247-264 [doi]
- A Coin-Free Oracle-Based Augmented Black Box FrameworkKyosuke Yamashita, Mehdi Tibouchi, Masayuki Abe. 265-272 [doi]
- A Lattice-Based Anonymous Distributed E-Cash from BitcoinZeming Lu, Zoe L. Jiang, Yulin Wu, Xuan Wang 0002, Yantao Zhong. 275-287 [doi]
- A Centralized Digital Currency System with Rich FunctionsHaibo Tian, Peiran Luo, Yinxue Su. 288-302 [doi]
- Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel NetworksBin Yu, Shabnam Kasra Kermanshahi, Amin Sakzad, Surya Nepal. 303-318 [doi]
- On-demand Privacy Preservation for Cost-Efficient Edge Intelligence Model TrainingZhi Zhou, Xu Chen. 321-329 [doi]
- One-Round Authenticated Group Key Exchange from IsogeniesAtsushi Fujioka, Katsuyuki Takashima, Kazuki Yoneyama. 330-338 [doi]
- TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-InvisibilityYi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Dawu Gu, Fei Huan, Yanxue Jia. 339-346 [doi]
- Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud ComputingXiang Li, Hui Tian 0002, Jianting Ning. 347-354 [doi]
- FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE SchemeLaltu Sardar, Sushmita Ruj. 355-371 [doi]
- A Hidden Markov Model-Based Method for Virtual Machine Anomaly DetectionChaochen Shi, Jiangshan Yu. 372-380 [doi]