Resource Fairness and Composability of Cryptographic Protocols Juan A. GarayPhilip MacKenzieKe Yang OriginalPaper 21 September 2010 Pages: 615 - 658
Efficient Selective Identity-Based Encryption Without Random Oracles Dan BonehXavier Boyen OriginalPaper 15 September 2010 Pages: 659 - 693
Securely Obfuscating Re-Encryption Susan HohenbergerGuy N. RothblumVinod Vaikuntanathan OriginalPaper 08 September 2010 Pages: 694 - 719
Secure Computation Without Authentication Boaz BarakRan CanettiTal Rabin OriginalPaper 15 September 2010 Pages: 720 - 760
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer Yehuda LindellHila Zarosim OriginalPaper 28 July 2010 Pages: 761 - 799