| 2012 | Anonymous Identity-Based Hash Proof System and Its Applications. Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao |
| 2012 | Authenticated Key Exchange with Entities from Different Settings and Varied Groups. Yanfei Guo, Zhenfeng Zhang |
| 2012 | Codes Based Tracing and Revoking Scheme with Constant Ciphertext. Xingwen Zhao, Hui Li |
| 2012 | Combined Public-Key Schemes: The Case of ABE and ABS. Cheng Chen, Jie Chen, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng |
| 2012 | Deterministic Random Oracles. Margus Niitsoo |
| 2012 | Efficient Escrow-Free Identity-Based Signature. Yunmei Zhang, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo |
| 2012 | Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures. Tapas Pandit, Rana Barua |
| 2012 | Efficient and Random Oracle-Free Conditionally Anonymous Ring Signature. Shengke Zeng, Zhiguang Qin, Qing Lu, Qinyi Li |
| 2012 | Fully Secure Doubly-Spatial Encryption under Simple Assumptions. Cheng Chen, Zhenfeng Zhang, Dengguo Feng |
| 2012 | ID Based Signcryption Scheme in Standard Model. S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan |
| 2012 | LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation. Bo Yang, Mingwu Zhang |
| 2012 | On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties. Reza Reyhanitabar, Willy Susilo |
| 2012 | On the (Non-)Equivalence of UC Security Notions. Oana Ciobotaru |
| 2012 | One-Move Convertible Nominative Signature in the Standard Model. Dennis Y. W. Liu, Duncan S. Wong |
| 2012 | Perfect Keyword Privacy in PEKS Systems. Mototsugu Nishioka |
| 2012 | Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu |
| 2012 | Revisiting a Secret Sharing Approach to Network Codes. ZhaoHui Tang, Hoon Wei Lim, Huaxiong Wang |
| 2012 | Secure Keyword Search Using Bloom Filter with Specified Character Positions. Takanori Suga, Takashi Nishide, Kouichi Sakurai |
| 2012 | Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices. Ioana Boureanu, Serge Vaudenay |
| 2012 | Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles. Zheng Yang, Jörg Schwenk |
| 2012 | Symmetric Inner-Product Predicate Encryption Based on Three Groups. Masayuki Yoshino, Noboru Kunihiro, Ken Naganuma, Hisayoshi Sato |
| 2012 | Tools over Bilinear Groups for Modular Design of Cryptographic Tasks. Masayuki Abe |