Abstract is missing.
- Public Key Based Searchable Encryption with Fine-Grained Sender Permission ControlZhongming Wang, Biwen Chen, Tao Xiang, Lu Zhou, Yan-Hong Liu, Jin Li 0002. 3-18 [doi]
- Improved Security Model for Public-Key Authenticated Encryption with Keyword SearchBaodong Qin, Hui Cui, Xiaokun Zheng, Dong Zheng 0001. 19-38 [doi]
- Public Key Encryption with Fuzzy MatchingYuanhao Wang 0002, Qiong Huang, Hongbo Li, Meiyan Xiao, Jianye Huang, Guomin Yang. 39-62 [doi]
- Partitioned Searchable EncryptionJim Barthel, Marc Beunardeau, Razvan Rosie, Rajeev Anand Sahu. 63-79 [doi]
- Key Exposure Resistant Group Key Agreement ProtocolTianqi Zhou, Jian Shen 0001, Sai Ji, Yongjun Ren, Mingwu Zhang. 83-97 [doi]
- NIKE from Affine Determinant ProgramsJim Barthel, Razvan Rosie. 98-115 [doi]
- OrBit: OR-Proof Identity-Based Identification with Tight Security for (as Low As) 1-Bit LossJason Chia, Ji-Jian Chin, Sook-Chin Yip. 116-135 [doi]
- Card-Based Zero-Knowledge Proof Protocols for Graph Problems and Their Computational ModelDaiki Miyahara, Hiromichi Haneda, Takaaki Mizuki. 136-152 [doi]
- Recovery Attack on Bob's Reused Randomness in CRYSTALS-KYBER and SABERSatoshi Okada, Yuntao Wang 0002. 155-173 [doi]
- A Lattice Reduction Algorithm Based on Sublattice BKZJinzheng Cao, Yanbin Pan, Qingfeng Cheng. 174-189 [doi]
- On the (M)iNTRU Assumption in the Integer CaseJim Barthel, Volker Müller, Razvan Rosie. 190-211 [doi]
- Verifiable Functional Encryption Using Intel SGXTatsuya Suzuki 0002, Keita Emura, Toshihiro Ohigashi, Kazumasa Omote. 215-240 [doi]
- Fully Secure Unbounded Zero Inner Product Encryption with Short Ciphertexts and KeysSubhranil Dutta, Tapas Pal, Ratna Dutta. 241-258 [doi]
- Inner-Product Functional Encryption from Random Linear Codes: Trial and ChallengesZhuoran Zhang, Zheng Zhang, Fangguo Zhang. 259-276 [doi]
- A CCA-Full-Anonymous Group Signature with Verifiable Controllable Linkability in the Standard ModelRu Xiang, Sha Ma, Qiong Huang, XiMing Li. 279-295 [doi]
- Cryptanalysis of LRainbow: The Lifted Rainbow Signature SchemeVikas Srivastava, Sumit Kumar Debnath. 296-308 [doi]
- Identification Scheme and Forward-Secure Signature in Identity-Based Setting from IsogeniesSurbhi Shaw, Ratna Dutta. 309-326 [doi]
- Linearly Homomorphic Signatures with Designated CombinerCheng-Jun Lin, Rui Xue 0001, Xinyi Huang. 327-345 [doi]
- Efficient Attribute-Based Signature for Monotone PredicatesJixin Zhang, Jiageng Chen, Weizhi Meng 0001. 346-362 [doi]
- Spatial Steganalysis Based on Gradient-Based Neural Architecture SearchXiaoqing Deng, Weiqi Luo, Yanmei Fang. 365-375 [doi]
- Turn-Based Communication ChannelsCarlo Brunetta, Mario Larangeira, Bei Liang, Aikaterini Mitrokotsa, Keisuke Tanaka. 376-392 [doi]