| 2010 | A Calculus for Game-Based Security Proofs. David Nowak, Yu Zhang |
| 2010 | A Framework for Constructing Convertible Undeniable Signatures. Ryo Kikuchi, Le Trieu Phong, Wakaha Ogata |
| 2010 | A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract). Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong |
| 2010 | A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication. Keita Emura, Atsuko Miyaji, Kazumasa Omote |
| 2010 | An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation. Keita Emura, Atsuko Miyaji, Kazumasa Omote |
| 2010 | Automating Computational Proofs for Public-Key-Based Key Exchange. Long Ngo, Colin Boyd, Juan Manuel González Nieto |
| 2010 | Collision Resistant Double-Length Hashing. Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks |
| 2010 | Cryptographic Protocols from Lattices. Eike Kiltz |
| 2010 | Distinguishing Distributions Using Chernoff Information. Thomas Baignères, Pouyan Sepehrdad, Serge Vaudenay |
| 2010 | Efficient Broadcast Encryption with Personalized Messages. Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa |
| 2010 | Efficient Confirmer Signatures from the "Signature of a Commitment" Paradigm. Laila El Aimani |
| 2010 | Formal and Precise Analysis of Soundness of Several Shuffling Schemes. Kun Peng, Feng Bao |
| 2010 | Fully Secure Threshold Unsigncryption. Javier Herranz, Alexandre Ruiz, Germán Sáez |
| 2010 | Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks. Hiroaki Anada, Seiko Arita |
| 2010 | Identity Based Public Verifiable Signcryption Scheme. S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
| 2010 | Improved Zero-Knowledge Identification with Lattices. Pierre-Louis Cayrel, Richard Lindner, Markus Rückert, Rosemberg Silva |
| 2010 | Interpreting Hash Function Security Proofs. Juraj Sarinay |
| 2010 | Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings Swee-Huay Heng, Kaoru Kurosawa |
| 2010 | Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption. Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro |