List of Accepted Papers
Full Papers | |
---|---|
1. | A code-based linkable ring signature scheme Pedro Branco and Paulo Mateus |
2. | On the Leakage of Corrupted Garbled Circuits Aurélien Dupin, David Pointcheval and Christophe Bidan |
3. | Location-Proof System based on Secure Multi-Party Computations Aurélien Dupin, Jean-Marc Robert and Christophe Bidan |
4. | Digital Signatures from the Middle-Product LWE Ryo Hiromasa |
5. | Modeling Privacy in WiFi Fingerprinting Indoor Localization Zheng Yang and Kimmo Järvinen |
6. | Verifiable Homomorphic Secret Sharing Georgia Tsaloli, Bei Liang and Aikaterini Mitrokotsa |
7. | Single Private-Key Generator Security Implies Multiple Private-Key Generators Security Atsushi Fujioka and Kazuki Yoneyama |
8. | Secure Outsourcing of Cryptographic Circuits Manufacturing Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis and Daniele Venturi |
9. | Multivariate encryption schemes based on the constrained MQ problem Takanori Yasuda |
10. | A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme Varshika Srinivasavaradhan, Arinjita Paul, Dr. Sharmila Deva Selvi S and Chandrasekaran Pandurangan |
11. | Token-Based Multi-Input Functional Encryption Nuttapong Attrapadung, Goichiro Hanaoka, Takato Hirano, Yutaka Kawai, Yoshihiro Koseki and Jacob C. N. Schuldt |
12. | On the CCA2 Security of McEliece in the Standard Model Edoardo Persichetti |
13. | Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation David Derler, Sebastian Ramacher and Daniel Slamanig |
14. | On the Hardness of Learning Parity with Noise over Rings Shuoyao Zhao, Yu Yu and Jiang Zhang |
15. | Efficient Attribute-Based Encryption with BlackBox Traceability Shengmin Xu, Guomin Yang and Yi Mu |
16. | Security notions for cloud storage and deduplication Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum and Mohsen Toorani |
17. | Length-Preserving Encryption Based on Single-key Tweakable Block Cipher Xiangyang Zhang, Yaobin Shen, Hailun Yan, Ying Zou, Ming Wan, Zheyi Wu and Lei Wang |
18. | Forward Secrecy for SPAKE2 Jose Becerra, Dimiter Ostrev and Marjan Skrobot |
19. | Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DejaQ and Dual-Form Signature Sanjit Chatterjee and R Kabaleeshwaran |
20. | Simpler Identity-Based Ring Signatures from Lattices Gongming Zhao and Miaomiao Tian |
21. | A Generic Construction of Sequential Aggregate MACs from Any MACs Shingo Sato, Shoichi Hirose and Junji Shikata |
Short Papers | |
---|---|
1. | User-Mediated Authentication Protocols and Unforgeability for Key Collision Britta Hale |
2. | Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols Satoshi Yasuda, Yoshihiro Koseki, Yusuke Sakai, Fuyuki Kitagawa, Yutaka Kawai and Goichiro Hanaoka |
3. | BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing Leon J. Helsloot, Gamze Tillem and Zekeriya Erkin |
4. | Signcryption with Quantum Random Oracles Shingo Sato and Junji Shikata |