Abstract is missing.
- Lower Bounds on Structure-Preserving Signatures for Bilateral MessagesMasayuki Abe, Miguel Ambrona, Miyako Ohkubo, Mehdi Tibouchi. 3-22 [doi]
- Fully Anonymous Group Signature with Verifier-Local RevocationAi Ishida, Yusuke Sakai 0001, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka. 23-42 [doi]
- Matrioska: A Compiler for Multi-key Homomorphic SignaturesDario Fiore, Elena Pagnin. 43-62 [doi]
- Unforgeable Watermarking Schemes with Public ExtractionRupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu. 63-80 [doi]
- Security Definitions for Hash Functions: Combining UCE and IndifferentiabilityDaniel Jost, Ueli Maurer. 83-101 [doi]
- A Constructive Perspective on Signcryption SecurityChristian Badertscher, Fabio Banfi, Ueli Maurer. 102-120 [doi]
- Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and KeysRomain Gay, Lucas Kowalczyk, Hoeteck Wee. 123-139 [doi]
- Simulation-Based Receiver Selective Opening CCA Secure PKE from Standard Computational AssumptionsKeisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka. 140-159 [doi]
- Lizard: Cut Off the Tail! A Practical Post-quantum Public-Key Encryption from LWE and LWRJung Hee Cheon, Duhyeong Kim, Joohee Lee, Yongsoo Song. 160-177 [doi]
- Reducing Communication Channels in MPCMarcel Keller, Dragos Rotaru, Nigel P. Smart, Tim Wood. 181-199 [doi]
- Proactive Secure Multiparty Computation with a Dishonest MajorityKarim Eldefrawy, Rafail Ostrovsky, Sunoo Park, Moti Yung. 200-215 [doi]
- From Fairness to Full Security in Multiparty ComputationRan Cohen, Iftach Haitner, Eran Omri, Lior Rotem. 216-234 [doi]
- Efficient Scalable Multiparty Private Set-Intersection via Garbled Bloom FiltersRoi Inbar, Eran Omri, Benny Pinkas. 235-252 [doi]
- Semantically Secure Anonymity: Foundations of Re-encryptionAdam L. Young, Moti Yung. 255-273 [doi]
- Securing Abe's Mix-Net Against Malicious Verifiers via Witness IndistinguishabilityElette Boyle, Saleet Klein, Alon Rosen, Gil Segev. 274-291 [doi]
- Zero-Knowledge Protocols for Search ProblemsBen Berger, Zvika Brakerski. 292-309 [doi]
- Evolving Ramp Secret-Sharing SchemesAmos Beimel, Hussien Othman. 313-332 [doi]
- Actively Secure OT-Extension from q-ary Linear CodesIgnacio Cascudo, René Bødker Christensen, Jaron Skovsted Gundersen. 333-348 [doi]
- Estimate All the {LWE, NTRU} Schemes!Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer. 351-367 [doi]
- More Efficient Commitments from Structured Lattice AssumptionsCarsten Baum, Ivan Damgård, Vadim Lyubashevsky, Sabine Oechsner, Chris Peikert. 368-385 [doi]
- Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel ConstructionsAkinori Hosoyamada, Yu Sasaki. 386-403 [doi]
- Obfuscation from Polynomial Hardness: Beyond Decomposable ObfuscationYuan Kang, Chengyu Lin, Tal Malkin, Mariana Raykova 0001. 407-424 [doi]
- Non-trivial Witness Encryption and Null-iO from Standard AssumptionsZvika Brakerski, Aayush Jain, Ilan Komargodski, Alain Passelègue, Daniel Wichs. 425-441 [doi]
- Secure Two-Party Computation over Unreliable ChannelsRan Gelles, Anat Paskin-Cherniavsky, Vassilis Zikas. 445-463 [doi]
- Combining Private Set-Intersection with Secure Two-Party ComputationMichele Ciampi, Claudio Orlandi. 464-482 [doi]
- Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key ExchangeJung Yeon Hwang, Stanislaw Jarecki, Taekyoung Kwon, Joohee Lee, Ji Sun Shin, Jiayu Xu. 485-504 [doi]
- On the Security Properties of e-Voting Bulletin BoardsAggelos Kiayias, Annabell Kuldmaa, Helger Lipmaa, Janno Siim, Thomas Zacharias 0001. 505-523 [doi]
- Function-Revealing Encryption - Definitions and ConstructionsMarc Joye, Alain Passelègue. 527-543 [doi]
- Function-Hiding Inner Product Encryption Is PracticalSam Kim, Kevin Lewi, Avradip Mandal, Hart Montgomery, Arnab Roy 0003, David J. Wu. 544-562 [doi]
- Compact IBBE and Fuzzy IBE from Simple AssumptionsJunqing Gong, Benoît Libert, Somindu C. Ramanna. 563-582 [doi]