List of Accepted Papers
| Full Papers | |
|---|---|
| 1. | A code-based linkable ring signature scheme Pedro Branco and Paulo Mateus |
| 2. | On the Leakage of Corrupted Garbled Circuits Aurélien Dupin, David Pointcheval and Christophe Bidan |
| 3. | Location-Proof System based on Secure Multi-Party Computations Aurélien Dupin, Jean-Marc Robert and Christophe Bidan |
| 4. | Digital Signatures from the Middle-Product LWE Ryo Hiromasa |
| 5. | Modeling Privacy in WiFi Fingerprinting Indoor Localization Zheng Yang and Kimmo Järvinen |
| 6. | Verifiable Homomorphic Secret Sharing Georgia Tsaloli, Bei Liang and Aikaterini Mitrokotsa |
| 7. | Single Private-Key Generator Security Implies Multiple Private-Key Generators Security Atsushi Fujioka and Kazuki Yoneyama |
| 8. | Secure Outsourcing of Cryptographic Circuits Manufacturing Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis and Daniele Venturi |
| 9. | Multivariate encryption schemes based on the constrained MQ problem Takanori Yasuda |
| 10. | A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme Varshika Srinivasavaradhan, Arinjita Paul, Dr. Sharmila Deva Selvi S and Chandrasekaran Pandurangan |
| 11. | Token-Based Multi-Input Functional Encryption Nuttapong Attrapadung, Goichiro Hanaoka, Takato Hirano, Yutaka Kawai, Yoshihiro Koseki and Jacob C. N. Schuldt |
| 12. | On the CCA2 Security of McEliece in the Standard Model Edoardo Persichetti |
| 13. | Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation David Derler, Sebastian Ramacher and Daniel Slamanig |
| 14. | On the Hardness of Learning Parity with Noise over Rings Shuoyao Zhao, Yu Yu and Jiang Zhang |
| 15. | Efficient Attribute-Based Encryption with BlackBox Traceability Shengmin Xu, Guomin Yang and Yi Mu |
| 16. | Security notions for cloud storage and deduplication Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum and Mohsen Toorani |
| 17. | Length-Preserving Encryption Based on Single-key Tweakable Block Cipher Xiangyang Zhang, Yaobin Shen, Hailun Yan, Ying Zou, Ming Wan, Zheyi Wu and Lei Wang |
| 18. | Forward Secrecy for SPAKE2 Jose Becerra, Dimiter Ostrev and Marjan Skrobot |
| 19. | Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DejaQ and Dual-Form Signature Sanjit Chatterjee and R Kabaleeshwaran |
| 20. | Simpler Identity-Based Ring Signatures from Lattices Gongming Zhao and Miaomiao Tian |
| 21. | A Generic Construction of Sequential Aggregate MACs from Any MACs Shingo Sato, Shoichi Hirose and Junji Shikata |
| Short Papers | |
|---|---|
| 1. | User-Mediated Authentication Protocols and Unforgeability for Key Collision Britta Hale |
| 2. | Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols Satoshi Yasuda, Yoshihiro Koseki, Yusuke Sakai, Fuyuki Kitagawa, Yutaka Kawai and Goichiro Hanaoka |
| 3. | BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing Leon J. Helsloot, Gamze Tillem and Zekeriya Erkin |
| 4. | Signcryption with Quantum Random Oracles Shingo Sato and Junji Shikata |