List of accepted papers

104: Decentralized Attribute-Based Signatures
Tatsuaki Okamoto (NTT, Japan)
Katsuyuki Takashima (Mitsubishi Electric, Japan)
105: Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
Keita Emura (NICT, Japan)
Goichiro Hanaoka (AIST, Japan)
Go Ohtake (Japan Broadcasting Corporation, Japan)
Takahiro Matsuda (AIST, Japan)
Shota Yamada (The University of Tokyo, Japan)
110: Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
Zhengan Huang (Shanghai Jiao Tong University, China)
Shengli Liu (Shanghai Jiao Tong University, China)
Baodong Qin (Shanghai Jiao Tong University, China and Southwest University of Science and Technology, China)
112: Revocable Identity-Based Encryption Revisited: Security Model and Construction
Jae Hong Seo (NICT, Japan)
Keita Emura (NICT, Japan)
113: Improved (Hierarchical) Inner-Product Encryption from Lattices
Keita Xagawa (NTT, Japan)
114: Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited
Takahiro Matsuda (AIST, Japan)
Goichiro Hanaoka (AIST, Japan)
116: Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
Seung Geol Choi (Columbia University)
Jonathan Katz (University of Maryland)
Hoeteck Wee (George Washington University)
Hong-Sheng Zhou (University of Maryland)
118: Vector Commitments and their Applications
Dario Catalano (Università di Catania, Italy)
Dario Fiore (MPI-SWS, Germany)
122: Non-Interactive Key Exchange
Eduarda S.V. Freire (Royal Holloway, University of London, UK)
Dennis Hofheinz (Karlsruhe Institute of Technology, Germany)
Eike Kiltz (Ruhr-Universität Bochum, Germany)
Kenneth G. Paterson (Royal Holloway, University of London, UK)
127: On the Semantic Security of Functional Encryption Schemes
Manuel Barbosa (HASLab - INESC TEC and Universidade do Minho, Portugal)
Pooya Farshim (Darmstadt University of Technology, Germany)
131: Rate-Limited Secure Function Evaluation
Özgür Dagdelen (Technische Universität Darmstadt, Germany)
Payman Mohassel (University of Calgary, Canada)
Daniele Venturi (Aarhus University, Denmark)
132: Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
Kwangsu Lee (Columbia University, USA)
Dong Hoon Lee (Korea University, Korea)
Moti Yung (Google Inc. and Columbia University, USA)
143: Attribute-Based Encryption with Fast Decryption
Susan Hohenberger (Johns Hopkins University, USA)
Brent Waters (University of Texas at Austin, USA)
145: Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
Fabrice Ben Hamouda (ENS, Paris, France)
Olivier Blazy (Ruhr-Universität Bochum, Germany)
Céline Chevalier (University of Paris II, France)
David Pointcheval (ENS, Paris, France)
Damien Vergnaud (ENS, Paris, France)
146: Tighter Reductions for Forward-Secure Signature Schemes
Michel Abdalla (ENS, Paris, France)
Fabrice Ben Hamouda (ENS, Paris, France)
David Pointcheval (ENS, Paris, France)
149: Robust Encryption, Revisited
Pooya Farshim (Darmstadt University of Technology, Germany)
Benoit Libert (Technicolor, France)
Kenneth G. Paterson (Royal Holloway, University of London, UK)
Elizabeth A. Quaglia (ENS, France)
150: Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures
Nuttapong Attrapadung (AIST, Japan)
Benoit Libert (Technicolor, France)
Thomas Peters (Universite catholique de Louvain, Belgium)
151: Cryptography Using CAPTCHA Puzzles
Abishek Kumarasubramanian (UCLA, USA)
Rafail Ostrovsky (UCLA, USA)
Omkant Pandey (The University of Texas at Austin, USA)
Akshay Wadia (UCLA, USA)
153: New Constructions and Applications of Trapdoor DDH Groups
Yannick Seurin (ANSSI, Paris, France)
155: On the Connection between Leakage Tolerance and Adaptive Security
Jesper Buus Nielsen (Aarhus University, Denmark)
Daniele Venturi (Aarhus University, Denmark)
Angela Zottarel (Aarhus University, Denmark)
158: Packed Ciphertexts in LWE-based Homomorphic Encryption
Zvika Brakerski (Stanford University, USA)
Craig Gentry (IBM Research, USA)
Shai Halevi (IBM Research, USA)
161: Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
Noboru Kunihiro (The University of Tokyo, Japan)
Naoyuki Shinohara (NICT, Japan)
Tetsuya Izu (Fujitsu Laboratories, Japan)
162: Tagged One-Time Signatures: Tight Security and Optimal Tag Size
Masayuki Abe (NTT, Japan)
Bernardo David (University of Brasilia, Brazil)
Markulf Kohlweiss (Microsoft Research, USA)
Ryo Nishimaki (NTT, Japan)
Miyako Ohkubo (NICT, Japan)
163: Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
Ryo Nishimaki (NTT, Japan)
Keita Xagawa (NTT, Japan)
164: Verifiable Elections That Scale for Free
Melissa Chase (MSR Redmond, USA)
Markulf Kohlweiss (MSR Cambridge, USA)
Anna Lysyanskaya (Brown University, USA)
Sarah Meiklejohn (UC San Diego, USA)
171: Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications
San Ling (Nanyang Technological University, Singapore)
Khoa Nguyen (Nanyang Technological University, Singapore)
Damien Stehle (ENS, Lyon, France)
Huaxiong Wang (Nanyang Technological University, Singapore)
178: Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
Jonathan Katz (University of Maryland, USA)
Aishwarya Thiruvengadam (University of Maryland, USA)
Hong-Sheng Zhou (University of Maryland, USA)
184: Combined Attack on CRT-RSA – Why Public Verification Must Not Be Public
Guillaume Barbu (Oberthur Technologies, France)
Alberto Battistello (Oberthur Technologies, France)
Guillaume Dabosville (Oberthur Technologies, France)
Christophe Giraud (Oberthur Technologies, France)
Guénaël Renault (Université Paris 6 / LIP6, France)
Soline Renner (Oberthur Technologies and Université Bordeaux 1 / IMB, France)
Rina Zeitoun (Oberthur Technologies and Université Paris 6 / LIP6, France)