109. Solving Underdetermined Systems of Multivariate Quadratic Equations
revisited
Enrico Thomae and Christopher Wolf
Affiliations: Ruhr-University Bochum
114. Strong Security from Probabilistic Signature Schemes
Sven Schäge
Affiliations: University College London
122. Variants of Waters' Dual System Primitives Using Asymmetric Pairings
Somindu C. Ramanna, Sanjit Chatterjee, and Palash Sarkar
Affiliations: Indian Statistical Institute Kolkata, Indian Institute of
Science Bangalore
125. Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, and Kazuki Yoneyama
Affiliations: NTT
126. Relations between Constrained and Bounded Chosen Ciphertext Security for Key
Encapsulation Mechanisms
Takahiro Matsuda, Goichiro Hanaoka, and Kanta Matsuura
Affiliations: RCIS AIST, Institute of Industrial Science, University of
Tokyo
129. Security of Blind Signatures Revisited
Dominique Schröder and Dominique Unruh
Affiliations: University of Maryland, University of Tartu
132. New Definitions and Separations for Circular Security
David Cash, Matthew Green, and Susan Hohenberger
Affiliations: IBM Research, Johns Hopkins University
134. From Selective to Full Security: Semi-Generic Transformations in the
Standard Model
Michel Abdalla, Dario Fiore, and Vadim Lyubashevsky
Affiliations: ENS Paris, NYU
137. Constant-Round Multi-Party Private Set Union using Reversed Laurent Series
Jae Hong Seo, Jung Hee Cheon, and Jonathan Katz
Affiliations: NICT, Seoul National University, University of Maryland
140. Functional Encryption for Threshold Functions (or, Fuzzy IBE) from Lattices
Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris,
and Hoeteck Wee
Affiliations: UCLA, Palo Alto Research Center, University of Toronto, Google Inc., George Washington
University
143. Public-Key Identification Schemes Based on Multivariate Cubic Polynomials
Koichi Sakumoto
Affiliations: Sony Corporation
156. The Construction of Ambiguous Optimistic Fair Exchange from Designated
Confirmer Signature without Random Oracles
Qiong Huang, Duncan S. Wong, and Willy Susilo
Affiliations: Souch China Agricultural University, City University of Hong
Kong, University of Wollongong
162. Anonymous Broadcast Encryption: Adaptive Security and Efficient
Constructions in the Standard Model
Benoit Libert, Kenneth G. Paterson, and Elizabeth A. Quaglia
Affiliations: Universite Catholique de Louvain, Royal Holloway University of
London
163. Efficient Network Coding Signatures in the Standard Model
Dario Catalano, Dario Fiore, and Bogdan Warinschi
Affiliations: Universita di Catania, ENS Paris, University of Bristol
168. Relatively-Sound NIZKs and Password-Based Key-Exchange
Charanjit Jutla and Arnab Roy
Affiliations: IBM T. J. Watson Research Center, Fujitsu Labs of America
169. Efficient Password Authenticated Key Exchange via Oblivious Transfer
Ran Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan, and Hoeteck Wee
Affiliations: Boston University, Microsoft Research New
England, University of Toronto, George Washington University
176. Polly Cracker with Noise is no better than Regev's Scheme
Gottfried Herold
Affiliations: Ruhr-University Bochum and Horst Görtz Institute for IT-Security
184. Policy-Enhanced Private Set Intersection: Sharing Information While
Enforcing Privacy Policies
Emil Stefanov, Elaine Shi, and Dawn Song
Affiliations: UC Berkeley
189. Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods
Aurelie Bauer, Damien Vergnaud, and Jean-Christophe Zapalowicz
Affiliations: Agence Nationale de la Sécurité des Systèmes d'Information,
ENS Paris
191. Correlated Product Security From Any One-Way Function
Brett Hemenway, Steve Lu, and Rafail Ostrovsky
Affiliations: University of Michigan, Stealth Software Technologies Inc., UCLA
192. Better Bootstrapping in Fully Homomorphic Encryption
Craig Gentry, Shai Halevi, and Nigel P. Smart
Affiliations: IBM Research, University of Bristol
194. Efficient implementation of a CCA2-secure variant of McEliece using
generalized Srivastava codes
Pierre-Louis Cayrel, Gerhard Hoffmann, and Edoardo Persichetti
Affiliations: Université Jean Monnet Saint-Etienne, TU Darmstadt, University
of Auckland
196. Extended-DDH and Lossy Trapdoor Functions
Brett Hemenway and Rafail Ostrovsky
Affiliations: University of Michigan, UCLA
197. Efficiently Shuffling in Public
Kim Ramchen and Vanessa Teague
Affiliations: University of Melbourne
202. Multi-Location Leakage Resilient Cryptography
Ali Juma, Yevgeniy Vahlis, and Moti Yung
Affiliations: Mozilla Corporation, AT&T, Google, Columbia University
210. Public-Key Cryptography from New Multivariate Quadratic Assumptions
Yun-Ju Huang, Feng-Hao Liu, and Bo-Yin Yang
Affiliations: Kyushu University, Brown University, Academia Sinica
212. Circular and KDM Security for Identity-Based Encryption
Jacob Alperin-Sheriff and Chris Peikert
Affiliations: Georgia Institute of Technology
228. Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
Nelly Fazio and Irippuge Milinda Perera
Affiliations: The City College of CUNY, The Graduate Center of CUNY
231. Space Efficient Signature Schemes from the RSA Assumption
Shota Yamada, Goichiro Hanaoka, and Noboru Kunihiro
Affiliations: University of Tokyo, AIST
232. Simple Ring-LWE in Polynomial Rings
Leo Ducas and Alain Durmus
Affiliations: ENS, Ecole des Ponts ParisTech
244. Homomorphic Encryption and Chosen-Ciphertext Security
Brett Hemenway and Rafail Ostrovsky
Affiliations: University of Michigan, UCLA
247. Verifiable Predicate Encryption and Applications to CCA Security and
Anonymous Predicate Authentication
Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Goichiro Hanaoka, Jacob
C.N. Schuldt, and Noboru Kunihiro
Affiliations: University of Tokyo, AIST
251. Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-bit
Elliptic Curve
Yumi Sakemi, Goichiro Hanaoka, Tetsuya Izu, Masahiko Takenaka, and Masaya
Yasuda
Affiliations: FUJITSU Laboratories, AIST
257. DDH-like Assumptions Based on Extension Rings
Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, and Angela Zottarel
Affiliations: CWI Amsterdam, Aarhus University, Ruhr-University Bochum
260. Waters Signatures with Optimal Security Reduction
Dennis Hofheinz, Tibor Jager, and Edward Knapp
Affiliations: Karlsruhe Institute of Technology, University of Waterloo
263. On definitions of selective opening security
Florian Böhl, Dennis Hofheinz, and Daniel Kraschewski
Affiliations: Karlsruhe Institute of Technology
272. Improved Security for Linearly Homomorphic Signatures: A Generic Framework
David Mandell Freeman
Affiliations: Stanford University
281. NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model
Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary, and Huaxiong
Wang
Affiliations: Macquarie University, Nanyang Technological University, Tsinghua University
283. Generating Provable Primes Efficiently on Embedded Devices
Christophe Clavier, Benoit Feix, Pascal Paillier, and Loic Thierry
Affiliations: XLIM, Inside Secure, CryptoExperts
284. On the Security of Dynamic Group Signatures
Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, and Kazuo
Ohta
Affiliations: University of Electro-Communications, AIST, JAIST
292. Public Key Encryption Against Related Key Attacks
Hoeteck Wee
Affiliations: George Washington University