Abstract is missing.
- Group Signature Without Random Oracles from Randomizable SignaturesRemi Clarisse, Olivier Sanders. 3-23 [doi]
- Constant-Size Lattice-Based Group Signature with Forward Security in the Standard ModelSébastien Canard, Adela Georgescu, Guillaume Kaim, Adeline Roux-Langlois, Jacques Traoré. 24-44 [doi]
- A Lattice-Based Provably Secure Multisignature Scheme in Quantum Random Oracle ModelMasayuki Fukumitsu, Shingo Hasegawa. 45-64 [doi]
- Achieving Pairing-Free Aggregate Signatures using Pre-Communication between SignersKaoru Takemure, Yusuke Sakai 0001, Bagus Santoso, Goichiro Hanaoka, Kazuo Ohta. 65-84 [doi]
- Short Lattice Signatures in the Standard Model with Efficient Tag GenerationKaisei Kajita, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi. 85-102 [doi]
- One-Time Delegation of Unlinkable Signing Rights and Its ApplicationTakashi Nishide. 103-123 [doi]
- Watermarkable Signature with Computational Function PreservingKyohei Sudo, Masayuki Tezuka, Keisuke Hara, Yusuke Yoshida, Keisuke Tanaka. 124-144 [doi]
- Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced EnvironmentsFei Zhu, Xun Yi, Sharif Abuadbba, Ibrahim Khalil, Xu Yang 0002, Surya Nepal, Xinyi Huang. 145-165 [doi]
- Semi-Adaptively Secure Offline Witness Encryption from Puncturable Witness PRFTapas Pal, Ratna Dutta. 169-189 [doi]
- Improved Indistinguishability for Searchable Symmetric EncryptionMoesfa Soeheila Mohamad, Ji-Jian Chin. 190-212 [doi]
- Receiver Selective Opening CCA Secure Public Key Encryption from Various AssumptionsYi Lu, Keisuke Hara, Keisuke Tanaka. 213-233 [doi]
- A Practical NIZK Argument for Confidential Transactions over Account-Model BlockchainShunli Ma, Yi Deng 0002, Mengqiu Bai, Debiao He, Jiang Zhang 0001, Xiang Xie. 234-253 [doi]
- Secure Cumulative Reward Maximization in Linear Stochastic BanditsRadu Ciucanu, Anatole Delabrouille, Pascal Lafourcade 0001, Marta Soare. 257-277 [doi]
- Secure Transfer Learning for Machine Fault Diagnosis Under Different Operating ConditionsChao Jin, Mohamed Ragab, Khin Mi Mi Aung. 278-297 [doi]
- Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over RingHikaru Tsuchida, Takashi Nishide, Yusaku Maeda. 298-317 [doi]
- Dispelling Myths on Superposition Attacks: Formal Security Model and Attack AnalysesLuka Music, Céline Chevalier, Elham Kashefi. 318-337 [doi]
- Fair and Sound Secret Sharing from Homomorphic Time-Lock PuzzlesJodie Knapp, Elizabeth A. Quaglia. 341-360 [doi]
- Optimal Threshold Changeable Secret Sharing with New Threshold Change RangeJian Ding, Changlu Lin, Fuchun Lin. 361-378 [doi]
- Key Recovery Under Plaintext Checking Attack on LACKe Wang, Zhenfeng Zhang, Haodong Jiang. 381-401 [doi]
- Security of Two NIST Candidates in the Presence of Randomness ReuseKe Wang, Zhenfeng Zhang, Haodong Jiang. 402-421 [doi]