| 2011 | A Novel Framework for Protocol Analysis. Kristian Gjøsteen, George Petrides, Asgeir Steine |
| 2011 | Anonymous Encryption with Partial-Order Subset Delegation Functionality. Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi |
| 2011 | Concurrent Signatures with Fully Negotiable Binding Control. Tsz Hon Yuen, Duncan S. Wong, Willy Susilo, Qiong Huang |
| 2011 | Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost. Cheng Chen, Zhenfeng Zhang, Dengguo Feng |
| 2011 | Efficient Identity-Based Signcryption in the Standard Model. Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi |
| 2011 | Fully Distributed Broadcast Encryption. Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer |
| 2011 | Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security. Fushan Wei, Chuangui Ma, Zhenfeng Zhang |
| 2011 | General Construction of Chameleon All-But-One Trapdoor Functions. Shengli Liu, Junzuo Lai, Robert H. Deng |
| 2011 | Generalized Learning Problems and Applications to Non-commutative Cryptography. Gilbert Baumslag, Nelly Fazio, Antonio Nicolosi, Vladimir Shpilrain, William E. Skeith III |
| 2011 | Generic Constant-Round Oblivious Sorting Algorithm for MPC. Bingsheng Zhang |
| 2011 | Identity-Based Trace and Revoke Schemes. Duong Hieu Phan, Viet Cuong Trinh |
| 2011 | Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing. Xianhui Lu, Bao Li, Qixiang Mei, Haixia Xu |
| 2011 | Optimal Structure-Preserving Signatures. Jens Groth |
| 2011 | PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers. Liting Zhang, Wenling Wu, Peng Wang |
| 2011 | Precise Time and Space Simulatable Zero-Knowledge. Ning Ding, Dawu Gu |
| 2011 | Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings Xavier Boyen, Xiaofeng Chen |
| 2011 | Randomness Leakage in the KEM/DEM Framework. Hitoshi Namiki, Keisuke Tanaka, Kenji Yasunaga |
| 2011 | Secure Composition of Cryptographic Protocols. Vipul Goyal |
| 2011 | Secure Obfuscation of Encrypted Verifiable Encrypted Signatures. Rong Cheng, Bo Zhang, Fangguo Zhang |
| 2011 | Secure Two-Party Computation over a Z-Channel. Paolo Palmieri, Olivier Pereira |
| 2011 | Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model. Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta |
| 2011 | Simulatable Adaptive Oblivious Transfer with Statistical Receiver's Privacy. Bingsheng Zhang |
| 2011 | Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security. Hai Huang |
| 2011 | TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption. Jiaxin Pan, Libin Wang |
| 2011 | Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage. Kazuki Yoneyama, Yunlei Zhao |
| 2011 | Toward Compact Public Key Encryption Based on CDH Assumption via Extended Twin DH Assumption. Yoshikazu Hanatani, Hirofumi Muratani, Tomoko Yonemura |
| 2011 | Universally Composable Private Proximity Testing. Rafael Tonicelli, Bernardo Machado David, Vinícius de Morais Alves |
| 2011 | Verifiable Security of Boneh-Franklin Identity-Based Encryption. Gilles Barthe, Federico Olmedo, Santiago Zanella-Béguelin |
| 2011 | Weak Oblivious Transfer from Strong One-Way Functions. Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga |