| 2016 | A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model. Jianye Huang, Qiong Huang, Chunhua Pan |
| 2016 | A Homomorphic Proxy Re-encryption from Lattices. Chunguang Ma, Juyan Li, Weiping Ouyang |
| 2016 | A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress). Jun Gao, Jiaqi Wang, Ning Lu, Fang Zhu, Wenbo Shi |
| 2016 | Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation. Gang Yu, Zhenfu Cao, Guang Zeng, Wenbao Han |
| 2016 | An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures. Hui Cui, Robert H. Deng, Guowei Wu, Junzuo Lai |
| 2016 | Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update. Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo |
| 2016 | Efficient Asymmetric Index Encapsulation Scheme for Named Data. Rong Ma, Zhenfu Cao |
| 2016 | Efficient Dynamic Provable Data Possession from Dynamic Binary Tree. Changfeng Li, Huaqun Wang |
| 2016 | ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure. Jianhong Zhang, Pengyan Li, Zhibin Sun, Jian Mao |
| 2016 | Identity-Based Batch Provable Data Possession. Fucai Zhou, Su Peng, Jian Xu, Zifeng Xu |
| 2016 | Integrity Analysis of Authenticated Encryption Based on Stream Ciphers. Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata |
| 2016 | Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing. Fucai Zhou, Yuxi Li, Alex X. Liu, Muqing Lin, Zifeng Xu |
| 2016 | Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction. Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto |
| 2016 | Oblivious Keyword Search with Authorization. Peng Jiang, Xiaofen Wang, Jianchang Lai, Fuchun Guo, Rongmao Chen |
| 2016 | One-Round Attribute-Based Key Exchange in the Multi-party Setting. Yangguang Tian, Guomin Yang, Yi Mu, Kaitai Liang, Yong Yu |
| 2016 | Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme. Zengpeng Li, Steven D. Galbraith, Chunguang Ma |
| 2016 | Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings Liqun Chen, Jinguang Han |
| 2016 | Secure Naïve Bayesian Classification over Encrypted Data in Cloud. Xingxin Li, Youwen Zhu, Jian Wang |
| 2016 | Secure and Efficient Construction of Broadcast Encryption with Dealership. Kamalesh Acharya, Ratna Dutta |
| 2016 | Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message. Yong Xie, Libing Wu, Yubo Zhang, Zhiyan Xu |
| 2016 | Towards Certificate-Based Group Encryption. Yili Ren, Xiling Luo, Qianhong Wu, Joseph K. Liu, Peng Zhang |
| 2016 | Towards Proofs of Ownership Beyond Bounded Leakage. Yongjun Zhao, Sherman S. M. Chow |
| 2016 | Universally Composable Cryptographic Role-Based Access Control. Bin Liu, Bogdan Warinschi |
| 2016 | Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage. Sujuan Li, Yi Mu, Mingwu Zhang, Futai Zhang |