Key Exchange Protocols

IoT-friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-key CryptographyGildas Avoine, Sébastien Canard and Loïc Ferreira Strongly Secure Identity-Based Key Exchange with Single Pairing OperationJunichi Tomida, Atsushi Fujioka, Akira Nagai and Koutarou Suzuki A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHopeYue Qin, Chi Cheng and Jintai Ding Breakdown Resilience of Key Exchange … Continued

Searchable Encryption

Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward PrivacyCong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao and Josef Pieprzyk Towards Efficient Verifiable Forward Secure Searchable Symmetric EncryptionZhongjun Zhang, Jianfeng Wang, Yunling Wang, Yaping Su and Xiaofeng Chen Generic Multi-keyword Ranked Search on Encrypted Cloud DataShabnam Kasra Kermanshahi, Joseph Liu, Ron Steinfeld and Surya … Continued

Cryptographic Protocols

Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from LatticesKeita Emura, Shuichi Katsumata and Yohei Watanabe Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud EmailsJianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xuexian Hu and Jianfeng Ma Feistel Structures for MPC, and MoreMartin Albrecht, Loenzo Grassi, Leo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos … Continued

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu