Accepted papers

109. Solving Underdetermined Systems of Multivariate Quadratic Equations revisited
Enrico Thomae and Christopher Wolf
Affiliations: Ruhr-University Bochum

114. Strong Security from Probabilistic Signature Schemes
Sven Schäge
Affiliations: University College London

122. Variants of Waters' Dual System Primitives Using Asymmetric Pairings
Somindu C. Ramanna, Sanjit Chatterjee, and Palash Sarkar
Affiliations: Indian Statistical Institute Kolkata, Indian Institute of Science Bangalore

125. Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, and Kazuki Yoneyama
Affiliations: NTT

126. Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms
Takahiro Matsuda, Goichiro Hanaoka, and Kanta Matsuura
Affiliations: RCIS AIST, Institute of Industrial Science, University of Tokyo

129. Security of Blind Signatures Revisited
Dominique Schröder and Dominique Unruh
Affiliations: University of Maryland, University of Tartu

132. New Definitions and Separations for Circular Security
David Cash, Matthew Green, and Susan Hohenberger
Affiliations: IBM Research, Johns Hopkins University

134. From Selective to Full Security: Semi-Generic Transformations in the Standard Model
Michel Abdalla, Dario Fiore, and Vadim Lyubashevsky
Affiliations: ENS Paris, NYU

137. Constant-Round Multi-Party Private Set Union using Reversed Laurent Series
Jae Hong Seo, Jung Hee Cheon, and Jonathan Katz
Affiliations: NICT, Seoul National University, University of Maryland

140. Functional Encryption for Threshold Functions (or, Fuzzy IBE) from Lattices
Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, and Hoeteck Wee
Affiliations: UCLA, Palo Alto Research Center, University of Toronto, Google Inc., George Washington University

143. Public-Key Identification Schemes Based on Multivariate Cubic Polynomials
Koichi Sakumoto
Affiliations: Sony Corporation

156. The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles
Qiong Huang, Duncan S. Wong, and Willy Susilo
Affiliations: Souch China Agricultural University, City University of Hong Kong, University of Wollongong

162. Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
Benoit Libert, Kenneth G. Paterson, and Elizabeth A. Quaglia
Affiliations: Universite Catholique de Louvain, Royal Holloway University of London

163. Efficient Network Coding Signatures in the Standard Model
Dario Catalano, Dario Fiore, and Bogdan Warinschi
Affiliations: Universita di Catania, ENS Paris, University of Bristol

168. Relatively-Sound NIZKs and Password-Based Key-Exchange
Charanjit Jutla and Arnab Roy
Affiliations: IBM T. J. Watson Research Center, Fujitsu Labs of America

169. Efficient Password Authenticated Key Exchange via Oblivious Transfer
Ran Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan, and Hoeteck Wee
Affiliations: Boston University, Microsoft Research New England, University of Toronto, George Washington University

176. Polly Cracker with Noise is no better than Regev's Scheme
Gottfried Herold
Affiliations: Ruhr-University Bochum and Horst Görtz Institute for IT-Security

184. Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Emil Stefanov, Elaine Shi, and Dawn Song
Affiliations: UC Berkeley

189. Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods
Aurelie Bauer, Damien Vergnaud, and Jean-Christophe Zapalowicz
Affiliations: Agence Nationale de la Sécurité des Systèmes d'Information, ENS Paris

191. Correlated Product Security From Any One-Way Function
Brett Hemenway, Steve Lu, and Rafail Ostrovsky
Affiliations: University of Michigan, Stealth Software Technologies Inc., UCLA

192. Better Bootstrapping in Fully Homomorphic Encryption
Craig Gentry, Shai Halevi, and Nigel P. Smart
Affiliations: IBM Research, University of Bristol

194. Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes
Pierre-Louis Cayrel, Gerhard Hoffmann, and Edoardo Persichetti
Affiliations: Université Jean Monnet Saint-Etienne, TU Darmstadt, University of Auckland

196. Extended-DDH and Lossy Trapdoor Functions
Brett Hemenway and Rafail Ostrovsky
Affiliations: University of Michigan, UCLA

197. Efficiently Shuffling in Public
Kim Ramchen and Vanessa Teague
Affiliations: University of Melbourne

202. Multi-Location Leakage Resilient Cryptography
Ali Juma, Yevgeniy Vahlis, and Moti Yung
Affiliations: Mozilla Corporation, AT&T, Google, Columbia University

210. Public-Key Cryptography from New Multivariate Quadratic Assumptions
Yun-Ju Huang, Feng-Hao Liu, and Bo-Yin Yang
Affiliations: Kyushu University, Brown University, Academia Sinica

212. Circular and KDM Security for Identity-Based Encryption
Jacob Alperin-Sheriff and Chris Peikert
Affiliations: Georgia Institute of Technology

228. Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
Nelly Fazio and Irippuge Milinda Perera
Affiliations: The City College of CUNY, The Graduate Center of CUNY

231. Space Efficient Signature Schemes from the RSA Assumption
Shota Yamada, Goichiro Hanaoka, and Noboru Kunihiro
Affiliations: University of Tokyo, AIST

232. Simple Ring-LWE in Polynomial Rings
Leo Ducas and Alain Durmus
Affiliations: ENS, Ecole des Ponts ParisTech

244. Homomorphic Encryption and Chosen-Ciphertext Security
Brett Hemenway and Rafail Ostrovsky
Affiliations: University of Michigan, UCLA

247. Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication
Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Goichiro Hanaoka, Jacob C.N. Schuldt, and Noboru Kunihiro
Affiliations: University of Tokyo, AIST

251. Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-bit Elliptic Curve
Yumi Sakemi, Goichiro Hanaoka, Tetsuya Izu, Masahiko Takenaka, and Masaya Yasuda
Affiliations: FUJITSU Laboratories, AIST

257. DDH-like Assumptions Based on Extension Rings
Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, and Angela Zottarel
Affiliations: CWI Amsterdam, Aarhus University, Ruhr-University Bochum

260. Waters Signatures with Optimal Security Reduction
Dennis Hofheinz, Tibor Jager, and Edward Knapp
Affiliations: Karlsruhe Institute of Technology, University of Waterloo

263. On definitions of selective opening security
Florian Böhl, Dennis Hofheinz, and Daniel Kraschewski
Affiliations: Karlsruhe Institute of Technology

272. Improved Security for Linearly Homomorphic Signatures: A Generic Framework
David Mandell Freeman
Affiliations: Stanford University

281. NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary, and Huaxiong Wang
Affiliations: Macquarie University, Nanyang Technological University, Tsinghua University

283. Generating Provable Primes Efficiently on Embedded Devices
Christophe Clavier, Benoit Feix, Pascal Paillier, and Loic Thierry
Affiliations: XLIM, Inside Secure, CryptoExperts

284. On the Security of Dynamic Group Signatures
Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, and Kazuo Ohta
Affiliations: University of Electro-Communications, AIST, JAIST

292. Public Key Encryption Against Related Key Attacks
Hoeteck Wee
Affiliations: George Washington University