-
Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited
Qixiang Mei (Graduate University of Chinese Academy of Sciences and Gunangdong Ocean University), Bao Li, Xianhui Lu and Dingding Jia (Graduate University of Chinese Academy of Sciences)
-
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
Dan Boneh and David Mandell Freeman (Stanford University, USA)
-
Fully Secure Accountable-Authority Identity-Based Encryption
Amit Sahai (UCLA - Computer Science) and Hakan Seyalioglu (UCLA - Mathematics)
-
Cryptanalysis of the RSA subgroup Assumption from TCC 2005
Jean-Sebastien Coron (University of Luxembourg), Antoine Joux (DGA and University of Versailles), Avradip Mandal (University of Luxembourg), David Naccache (ENS) and Mehdi Tibouchi (ENS and University of Luxembourg)
-
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
Brent Waters (University of Texas at Austin)
-
Cryptanalysis of Cryptosystems Based on Non-commutative Skew Polynomials
Vivien Dubois (DGA/MI, Rennes) and Jean-Gabriel Kammerer (DGA/MI, Rennes and IRMAR, Université de Rennes 1)
-
Linear Recurring Sequences for the UOV Key Generation
Albrecht Petzoldt, Stanislav Bulygin and Johannes Buchmann (TU Darmstadt)
-
(If) Size Matters: Size-Hiding Private Set Intersection
Giuseppe Ateniese (Johns Hopkins University), Emiliano De Cristofaro, and Gene Tsudik (University of California, Irvine)
-
On Impossibility of Instantiating PSS in the Standard Model
Rishiraj Bhattacharyya (Indian Statistical Institute, Kolkata) and Avradip Mandal (University of Luxembourg, Luxembourg)
-
Chosen-Ciphertext Security Based on Chameleon Lossy Trapdoor Functions
Junzuo Lai, Robert H. Deng (Singapore Management University) and Shengli Liu (Shanghai Jiao Tong University)
-
Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three
Roberto Avanzi (Ruhr University of Bochum) and Clemens Heuberger (Technical University of Graz)
-
Sub-Linear, Secure Comparison With Two Non-Colluding Parties
Tomas Toft (Aarhus University, Denmark)
-
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
Shota Yamada (The University of Tokyo), Nuttapong Attrapadung, Goichiro Hanaoka (National Institute of Advanced Industrial Science and Technology) and Noboru Kunihiro (The University of Tokyo)
-
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants
Luk Bettale, Jean-Charles Faugère and Ludovic Perret (INRIA/CNRS/UMPC, France)
-
Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra
Jae Hong Seo (Seoul National University, Korea)
-
On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010
Jian Weng (Jinan University, Guangzhou, China), Yunlei Zhao (Fudan University, Shanghai, China), Goichiro Hanaoka (National Institute of Advanced Industrial Science and Technology, Tokyo, Japan)
-
Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
Nuttapong Attrapadung (Research Center for Information Security, AIST, Japan), and Benoit Libert (Universite catholique de Louvain, Belgium) and Elie de Panafieu (Ecole Normale Superieure - Cachan, France)
-
Randomizable Signatures on Encrypted Messages
Olivier Blazy (ENS, Paris, France), Georg Fuchsbauer (Univ. Bristol, UK), David Pointcheval (ENS, Paris, France), and Damien Vergnaud (ENS, Paris, France)
-
One-Pass HMQV and Asymmetric Key-Wrapping
Shai Halevi and Hugo Krawczyk (IBM Research)
-
On-line Non-transferable Signatures Revisited
Jacob C.N. Schuldt (RCIS, AIST, Japan) and Kanta Matsuura (IIS, The University of Tokyo)
-
Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks
Takahiro Matsuda and Kanta Matsuura (The University of Tokyo)
-
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model
Tatsuaki Okamoto (NTT) and Katsuyuki Takashima (Mitsubishi Electric)
-
Revocation for Delegatable Anonymous Credentials
Lan Nguyen and Tolga Acar (Microsoft Research)
-
Homomorphic Network Coding Signatures in the Standard Model
Nuttapong Attrapadung (Research Center for Information Security, AIST, Japan) and Benoit Libert (Universite catholique de Louvain, Belgium)
-
Oblivious Transfer with Hidden Access Control Policies
Jan Camenisch, Maria Dubovitskaya, Gregory Neven (IBM Research - Zurich), and Gregory M. Zaverucha (Certicom Research)
-
Secure Blind Decryption
Matthew Green (Johns Hopkins University)
-
Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem
Charles Bouillaguet (ENS, France), Jean-Charles Faugère (INRIA/CNRS/UMPC, France), Pierre-Alain Fouque (ENS, France) and Ludovic Perret (INRIA/CNRS/UMPC, France)
-
On the correct use of the negation map in the Pollard rho method
Daniel J. Bernstein (University of Illinois at Chicago), Tanja Lange and Peter Schwabe (Technische Universiteit Eindhoven)