Abstract is missing.
- Efficient Zero-Knowledge Arguments for Matrix Relations over Rings and Non-malleable EnhancementYuan Tian, Xinke Tian, Yongda Pang. 3-26 [doi]
- Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse RepresentationFuhu Wu, Lin Wang, Shun Zhang 0002, Jie Cui 0004, Hong Zhong 0001. 27-43 [doi]
- Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing Secure ConnectionsHao Zhu, Fagen Li, Lihui Liu, Yong Zeng, Xiaoli Li, Jianfeng Ma. 44-63 [doi]
- Improved Key-Recovery Attacks Under Imperfect SCA Oracle for Lattice-Based KEMsWenhao Shi, Jiang Han, Haodong Jiang, Zhi Ma 0001. 67-82 [doi]
- Linear Cryptanalysis of Lightweight Block Cipher WARPHong Xu, Chunyu Hao, Zhichao Xu, Wenfeng Qi. 83-90 [doi]
- Linicrypt in the Ideal Cipher ModelZahra Javar, Bruce M. Kapron. 91-111 [doi]
- SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature Between PKI and IBCYibing Wang, Xiaoxiao Wang, Chin-Tser Huang, Dejun Wang, Binhao Ma, Bo Meng. 115-130 [doi]
- Key-Range Attribute-Based Signatures for Range of Inner Product and Its ApplicationsMasahito Ishizaka. 131-156 [doi]
- A Certificateless Aggregate Signature Scheme with Better SecurityRan Xu, Yanwei Zhou, Yu Han, Bo Yang 0003. 157-165 [doi]
- Constant-Size Group Signatures with Message-Dependent Opening from LatticesSimin Chen, Jiageng Chen, Atsuko Miyaji, Kaiming Chen. 166-185 [doi]
- Post-quantum Sigma Protocols and Signatures from Low-Rank Matrix CompletionsJiaming Wen, Houzhen Wang, Huanguo Zhang. 186-206 [doi]
- Threshold Ring Signature Scheme from Cryptographic Group ActionMinh Thuy Truc Pham, Dung Hoang Duong, Yannan Li, Willy Susilo. 207-227 [doi]
- Homomorphic Witness Encryption from Indistinguishable ObfuscationYuzhu Wang, Xingbo Wang, Mingwu Zhang. 231-250 [doi]
- Identity-Based Matchmaking Encryption Secure Against Key Generation CenterSohto Chiku, Keisuke Hara, Junji Shikata. 251-273 [doi]
- Multi-input Functional Encryption for Unbounded Inner ProductsBishnu Charan Behera, Somindu C. Ramanna. 274-289 [doi]
- FleS: A Compact and Parameter-Flexible Supersingular Isogeny Based Public Key Encryption SchemeWeihan Huang, Min Luo 0002, Cong Peng 0005, Debiao He. 290-308 [doi]
- A New Revocable Attribute Based Encryption on LatticeLifeng Guo, Lingxia Wang, Xueke Ma, Qianli Ma. 309-326 [doi]
- An Efficient Keyword-Based Ciphertext Retrieval SchemeZihao Liu, Ruixuan Deng, Chongxi Guan, Hua Shen. 327-341 [doi]
- Privacy Preserving Outsourced K-means Clustering Using Kd-treeYanxiang Deng, Lin Liu, Shaojing Fu, Yuchuan Luo, Wei Wu 0015, Shixiong Wang. 345-364 [doi]
- Fuzzy Deduplication Scheme Supporting Pre-verification of Label ConsistencyZehui Tang, Shengke Zeng, Tao Li, Shuai Cheng, Haoyu Zheng. 365-384 [doi]
- A Privacy-Preserving Takeaway Delivery Service SchemeLang Xu, Jiqiang Li, Hao Zhang, Hua Shen. 385-403 [doi]
- CDRF: A Detection Method of Smart Contract Vulnerability Based on Random ForestMeng Huang, Jia Yang, Cong Liu. 407-428 [doi]
- simuBits: Pool Security Verification of Novel Mining AttacksZunlong Zhou, Wen Chen, Linrui Li, Yilin Zhang. 429-447 [doi]