| 2007 | (Password) Authenticated Key Establishment: From 2-Party to Group. Michel Abdalla, Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt |
| 2007 | Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions. Carmit Hazay, Jonathan Katz, Chiu-Yuen Koo, Yehuda Lindell |
| 2007 | Conjunctive, Subset, and Range Queries on Encrypted Data. Dan Boneh, Brent Waters |
| 2007 | Designated Confirmer Signatures Revisited. Douglas Wikström |
| 2007 | Does Privacy Require True Randomness? Carl Bosley, Yevgeniy Dodis |
| 2007 | Evaluating Branching Programs on Encrypted Data. Yuval Ishai, Anat Paskin |
| 2007 | From Weak to Strong Watermarking. Nicholas Hopper, David Molnar, David A. Wagner |
| 2007 | How to Shuffle in Public. Ben Adida, Douglas Wikström |
| 2007 | Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish |
| 2007 | Long-Term Security and Universal Composability. Jörn Müller-Quade, Dominique Unruh |
| 2007 | Lower Bounds for Non-interactive Zero-Knowledge. Hoeteck Wee |
| 2007 | Multi-authority Attribute Based Encryption. Melissa Chase |
| 2007 | Obfuscation for Cryptographic Purposes. Dennis Hofheinz, John Malone-Lee, Martijn Stam |
| 2007 | On Best-Possible Obfuscation. Shafi Goldwasser, Guy N. Rothblum |
| 2007 | On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits. Oded Goldreich |
| 2007 | On Secret Sharing Schemes, Matroids and Polymatroids. Jaume Martí-Farré, Carles Padró |
| 2007 | On the Necessity of Rewinding in Secure Multiparty Computation. Michael Backes, Jörn Müller-Quade, Dominique Unruh |
| 2007 | One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments. Hoeteck Wee |
| 2007 | Parallel Repetition of Computationally Sound Protocols Revisited. Krzysztof Pietrzak, Douglas Wikström |
| 2007 | Perfect NIZK with Adaptive Soundness. Masayuki Abe, Serge Fehr |
| 2007 | Private Approximation of Clustering and Vertex Cover. Amos Beimel, Renen Hallak, Kobbi Nissim |
| 2007 | Robuster Combiners for Oblivious Transfer. Remo Meier, Bartosz Przydatek, Jürg Wullschleger |
| 2007 | Secure Linear Algebra Using Linearly Recurrent Sequences. Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew K. Franklin |
| 2007 | Securely Obfuscating Re-encryption. Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan |
| 2007 | Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. Yonatan Aumann, Yehuda Lindell |
| 2007 | Tackling Adaptive Corruptions in Multicast Encryption Protocols. Saurabh Panjwani |
| 2007 | Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings Salil P. Vadhan |
| 2007 | Towards Optimal and Efficient Perfectly Secure Message Transmission. Matthias Fitzi, Matthew K. Franklin, Juan A. Garay, Harsha Vardhan Simhadri |
| 2007 | Towards a Separation of Semantic and CCA Security for Public Key Encryption. Yael Gertner, Tal Malkin, Steven A. Myers |
| 2007 | Unifying Classical and Quantum Key Distillation. Matthias Christandl, Artur Ekert, Michal Horodecki, Pawel Horodecki, Jonathan Oppenheim, Renato Renner |
| 2007 | Universally Composable Security with Global Setup. Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish |
| 2007 | Weakly-Private Secret Sharing Schemes. Amos Beimel, Matthew K. Franklin |