Abstract is missing.
- A Generic Construction of CCA-Secure Attribute-Based Encryption with Equality TestKyoichi Asano, Keita Emura, Atsushi Takayasu, Yohei Watanabe 0001. 3-19 [doi]
- Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword SearchPan Yang, Hongbo Li, Jianye Huang, Hao Zhang, Man Ho Au, Qiong Huang. 20-35 [doi]
- More Efficient Verifiable Functional EncryptionGeng Wang, Ming Wan, Dawu Gu. 36-51 [doi]
- Subverting DeniabilityMarcel Armour, Elizabeth A. Quaglia. 52-59 [doi]
- Epoch Confidentiality in Updatable EncryptionJodie Knapp, Elizabeth A. Quaglia. 60-67 [doi]
- Simplified Server-Aided Revocable Identity-Based Encryption from LatticesYanhua Zhang, Ximeng Liu, Yupu Hu. 71-87 [doi]
- Lattice-Based Public Key Cryptosystems Invoking Linear Mapping MaskYuntao Wang 0002, Yasuhiko Ikematsu, Takanori Yasuda. 88-104 [doi]
- Batched Fully Dynamic Multi-key FHE from FHEW-Like CryptosystemsYuting Jiang, Jianghong Wei, Jing Pan. 105-120 [doi]
- Zero-Knowledge Range Arguments for Signed Fractional Numbers from LatticesPriyanka Dutta 0001, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto. 121-136 [doi]
- Fast Out-of-Band Data Integrity Monitor to Mitigate Memory Corruption AttacksJian Huang, Shanliang Xue, Caiyi Wang. 139-155 [doi]
- Construction of a New UAV Management System Based on UMIA TechnologyGe Zhang, Yu Geng, Xueman Kong, Yifa Li. 156-166 [doi]
- 2-MIA: A Membership Inference Attack Free of Posterior Probability in Machine UnlearningZhaobo Lu, Yilei Wang, Qingzhe Lv, Minghao Zhao 0001, Tiancai Liang. 167-175 [doi]
- Practical Federated Learning for Samples with Different IDsYu Li, Junzuo Lai, Xiaowei Yuan, Beibei Song. 176-195 [doi]
- Reinforcement-Mining: Protecting Reward in Selfish MiningZhaojie Wang, Willy Susilo, Jianan Guo, Yilei Wang, Minghao Zhao 0001. 199-209 [doi]
- FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS AttacksWei-Yang Chiu, Weizhi Meng 0001, Wenjuan Li 0001, Liming Fang 0001. 210-227 [doi]
- Secure Collaboration Between Consortiums in Permissioned BlockchainsJuzheng Huang, Qiang Tang 0005, Chunhua Su, Na Ruan. 228-245 [doi]
- (Public) Verifiability for Composable Protocols Without Adaptivity or Zero-KnowledgeCarsten Baum, Bernardo David, Rafael Dowsley. 249-272 [doi]
- Practical Non-malleable Codes from Symmetric-Key Primitives in 2-Split-State ModelAnit Kumar Ghosal, Satrajit Ghosh, Dipanwita Roychowdhury. 273-281 [doi]
- Cryptographic Role-Based Access Control, ReconsideredBin Liu, Antonis Michalas, Bogdan Warinschi. 282-289 [doi]