(Those marked with * have been picked.) [Property-Preserving Encryption] Florian Kerschbaum. *Frequency-Hiding Order-Preserving Encryption. ACM CCS 2015. http://www.fkerschbaum.org/ccs15.pdf Melissa Chase, Emily Shen. *Substring-Searchable Symmetric Encryption. PETS 2015. http://ia.cr/2014/638 Jun Furukawa. *Short Comparable Encryption. CANS 2014. http://dx.doi.org/10.1007/978-3-319-12280-9_22 Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios. GRECS: Graph Encryption for Approximate Shortest Distance Queries. ACM CCS 2015. http://ia.cr/2015/266 Florian Kerschbaum, Axel Schröpfer. Optimal Average-Complexity Ideal-Security Order-Preserving Encryption. ACM CCS 2014. http://www.fkerschbaum.org/ccs14a.pdf [Spectrum Auction] Ming Li, Pan Li, Linke Guo, Xiaoxia Huang. *PPER: Privacy-Preserving Economic-Robust Spectrum Auction in Wireless Networks IEEE Infocom 2015. http://www.cse.unr.edu/~mingli/papers/infocom15auction.pdf Miao Pan, Jinyuan Sun, Yuguang Fang. Purging the Back-Room Dealing: Secure Spectrum Auction Leveraging Paillier Cryptosystem. IEEE Journal on Selected Areas in Communications 29(4): 866-876 (2011) http://www.fang.ece.ufl.edu/mypaper/jsac11pan.pdf [Machine Learning] Kaihe Xu, Hao Yue, Linke Guo, Yuanxiong Guo, Yuguang Fang. *Privacy-Preserving Machine Learning Algorithms for Big Data Systems. ICDCS 2015. Yan Huang, Lior Malka, David Evans, Jonathan Katz. *Efficient Privacy-Preserving Biometric Identification. NDSS 2011. http://www.mightbeevil.org/secure-biometrics/ndss2011.pdf Marina Blanton, Paolo Gasti. Secure and Efficient Protocols for Iris and Fingerprint Identification. ESORICS 2011. http://ia.cr/2010/627 Margarita Osadchy, Benny Pinkas, Ayman Jarrous, Boaz Moskovich. SCiFI - A System for Secure Face Identification. IEEE S&P 2010. http://www.cs.haifa.ac.il/scifi [Secure Outsourcing] Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou. *IntegriDB: Verifiable SQL for Outsourced Databases. CCS 2015. http://www.ece.umd.edu/~cpap/published/IntegriDB.pdf [Encrypted Storage] Timothy M. Peters, Mark A. Gondree, Zachary N. J. Peterson. *DEFY: A Deniable, Encrypted File System for Log-Structured Storage. NDSS 2015. http://www.internetsociety.org/sites/default/files/04_5_1.pdf Feng Hao, Dylan Clarke, Avelino Francisco Zorzo. Deleting Secret Data with Public Verifiability. IEEE TPDS 2015. http://ia.cr/2014/364 Jan Camenisch, Anja Lehmann. (Un)linkable Pseudonyms for Governmental Databases. ACM CCS 2015. http://www.zurich.ibm.com/pdf/csc/pseudonyms_paper.pdf [Anonymous System] Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, Emmett Witchel. *Anon-Pass: Practical Anonymous Subscriptions. IEEE S&P 2013. http://www.cs.utexas.edu/~adunn/pubs/lee13oakland-anonpass-full.pdf Henry Corrigan-Gibbs, Dan Boneh, David Mazières. Riposte: An Anonymous Messaging System Handling Millions of Users. IEEE S&P 2015. http://www.scs.stanford.edu/~dm/home/papers/corrigan-gibbs:riposte.pdf Susan Hohenberger, Steven Myers, Rafael Pass, Abhi Shelat. Anonize: A Large-Scale Anonymous Survey System. IEEE S&P 2014. http://ia.cr/2015/681 [e-Payment] Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten. *SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. IEEE S&P 2015. http://www.jbonneau.com/doc/BMCNKF15-IEEESP-bitcoin.pdf Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Kim Pecina. *Privacy Preserving Payments in Credit Networks. NDSS 2015. http://www.internetsociety.org/sites/default/files/04_3_2.pdf [Signatures] Eike Kiltz, Jiaxin Pan, Hoeteck Wee. *Structure-Preserving Signatures from Standard Assumptions, Revisited. Crypto 2015. http://ia.cr/2015/604 Giuseppe Ateniese, Bernardo Magri, Daniele Venturi. Subversion-Resilient Signature Schemes. ACM CCS 2015. http://ia.cr/2015/517 Georg Fuchsbauer, Christian Hanser, Daniel Slamanig. EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes. IACR Cryptology ePrint Archive 2014/944. http://ia.cr/2014/944 [Group/Ring Signatures] Jens Groth, Markulf Kohlweiss. *One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin. EuroCrypt 2015. http://ia.cr/2014/764 Vireshwar Kumar, He Li, Jung-Min (Jerry) Park, Kaigui Bian, Yaling Yang. Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication. ACM CCS 2015. Benoˆıt Libert, Thomas Peters, Moti Yung. Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions. Crypto 2015. http://ia.cr/2015/743 [Functional Encryption] Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, Xiaofeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter *Controlled Functional Encryption. ACM CCS 2014. http://web.engr.illinois.edu/~naveed2/pub/CCS2014CFE.pdf Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval. *Simple Functional Encryption Schemes for Inner Products. PKC 2015. http://ia.cr/2015/017 Yvo Desmedt, Vincenzo Iovino, Giuseppe Persiano, Ivan Visconti. Controlled Homomorphic Encryption: Definition and Construction IACR Cryptology ePrint Archive 2014/989. http://ia.cr/2014/989 Anna Lisa Ferrara, Georg Fuchsbauer, Bin Liu, Bogdan Warinschi. Policy Privacy in Cryptographic Access Control. CSF 2015. [Cryptographic Primitives] Dario Catalano, Dario Fiore, Luca Nizzardo. *Programmable Hash Functions go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys. Crypto 2015. http://ia.cr/2015/826 Susan Hohenberger, Allison Lewko, Brent Waters. *Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security. Eurocrypt 2012. http://ia.cr/2012/006 Susan Hohenberger, Venkata Koppula, Brent Waters. Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model. AsiaCrypt 2015. http://ia.cr/2014/521