(Those marked with * have been picked.) [Anonymous Credential] Accumulators with Applications to Anonymity-Preserving Revocation Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, and Sophia Yakoubov IEEE European Symposium on Security and Privacy 2017 https://eprint.iacr.org/2017/043 Anonymous Attestation with Subverted TPMs Jan Camenisch, Manu Drijvers, and Anja Lehmann Crypto 2017 https://eprint.iacr.org/2017/200 One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, and Rainer Urian IEEE Security & Privacy 2017 https://eprint.iacr.org/2017/639 Privacy for Distributed Databases via (Un)linkable Pseudonyms Jan Camenisch and Anja Lehmann CCS 2015 https://eprint.iacr.org/2017/022 [Applications] Stadium: A Distributed Metadata-Private Messaging System Nirvan Tyagi, Yossi Gilad, Derek Leung, Matei Zaharia, and Nickolai Zeldovich SOSP 2017 https://eprint.iacr.org/2016/943 [Bitcoin / Blockchain] *Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control Gabriel Kaptchuk, Ian Miers, and Matthew Green Pre-print https://eprint.iacr.org/2017/201 *Redactable Blockchain -- or -- Rewriting History in Bitcoin and Friends Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, Ewerton Andrade Euro S&P 2017 https://eprint.iacr.org/2016/757 *Transparency Overlays and Applications Melissa Chase and Sarah Meiklejohn CCS 2016 https://eprint.iacr.org/2016/915 [Elections] BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme Pyrros Chaidos, Véronique Cortier, Georg Fuchsbauer, and David Galindo CCS 2016 https://hal.inria.fr/hal-01377917 SoK: A comprehensive analysis of game-based ballot privacy definitions David Bernhard, Veronique Cortier, David Galindo, Olivier Pereira, and Bogdan Warinschi IEEE Symposium on Security and Privacy 2015 https://oaklandsok.github.io/papers/bernhard2014.pdf SoK: Verifiability Notions for E-Voting Protocols Veronique Cortier, David Galindo, Ralf Kusters, Johannes Muller, Tomasz Truderung IEEE Symposium on Security and Privacy 2016 https://www.ieee-security.org/TC/SP2016/papers/0824a779.pdf *Machine-Checked Proofs of Privacy for Electronic Voting Protocols Véronique Cortier, Constantin Catalin Dragan, François Dupressoir, Benedikt Schmidt, Pierre-Yves Strub, and Bogdan Warinschi IEEE Symposium on Security and Privacy 2017 https://members.loria.fr/VCortier/files/Papers/SP17.pdf Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme David Bernhard, Oksana Kulyk, Melanie Volkamer ACM Availability, Reliability and Security (ARES) 2017 https://www.secuso.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_SECUSO/Papers/SecurityProofsforParticipationPrivacyReceiptFreenessandBallotPrivacyfortheHeliosVotingScheme.pdf [Encrypted Storage] Feng Hao, Dylan Clarke, Avelino Francisco Zorzo. Deleting Secret Data with Public Verifiability. IEEE TPDS 2015. http://ia.cr/2014/364 (Un)linkable Pseudonyms for Governmental Databases. Jan Camenisch and Anja Lehmann. ACM CCS 2015. http://www.zurich.ibm.com/pdf/csc/pseudonyms_paper.pdf [Group/Ring Signatures] RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero Shi-Feng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Dawu Gu https://eprint.iacr.org/2017/921 Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication. Vireshwar Kumar, He Li, Jung-Min (Jerry) Park, Kaigui Bian, Yaling Yang. ACM CCS 2015. Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions. Benoit Libert, Thomas Peters, Moti Yung. Crypto 2015. http://ia.cr/2015/743 [Hardware-Assited Cryptography] *Iron: Functional Encryption using Intel SGX. Ben A. Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, and Sergey Gorbunov CCS 2017. https://eprint.iacr.org/2016/1071 Oblivious Multi-Party Machine Learning on Trusted Processors. Olga Ohrimenko, Felix Schuster, C´edric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. Usenix Security 2016 https://www.microsoft.com/en-us/research/wp-content/uploads/2016/07/paper.pdf [Identity/Attribute-Based Encryption] *Identity-Based Encryption from the Diffie-Hellman Assumption Nico Döttling and Sanjam Garg Crypto 2017 https://eprint.iacr.org/2017/543 *From Selective IBE to Full IBE and Selective HIBE Nico Döttling and Sanjam Garg TCC 2017 https://eprint.iacr.org/2017/957 Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions Miguel Ambrona, Gilles Barthe, Romain Gay, and Hoeteck Wee CCS 2017 https://eprint.iacr.org/2017/983 FAME: Fast Attribute-based Message Encryption Shashank Agrawal and Melissa Chase CCS 2017 https://eprint.iacr.org/2017/807 [Order-Revealing Encryption] *Practical Order-Revealing Encryption with Limited Leakage Nathan Chenette, Kevin Lewi, Stephen A. Weis, and David J. Wu. FSE 2016 https://eprint.iacr.org/2015/1125 *Leakage-Abuse Attacks against Order-Revealing Encryption Paul Grubbs, Kevin Sekniqi, Vincent Bindschaedler, Muhammad Naveed, and Thomas Ristenpart. IEEE Symposium on Security and Privacy 2017. https://eprint.iacr.org/2016/895 [Password] *Robust Password-Protected Secret Sharing Michel Abdalla, Mario Cornejo, Anca Nitulescu, and David Pointcheval ESORICS 2016 https://eprint.iacr.org/2016/123 [Primitive] Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model. Susan Hohenberger, Venkata Koppula, and Brent Waters. AsiaCrypt 2015. http://ia.cr/2014/521 [Processing Encrypted Data] *Privacy-Preserving Distributed Linear Regression on High-Dimensional Data Adrià Gascón, Phillipp Schoppmann, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, David Evans. PETS 2017 https://eprint.iacr.org/2016/892 *Practical Secure Aggregation for Privacy-Preserving Machine Learning Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, and Karn Seth. CCS 2017 https://eprint.iacr.org/2017/281 [Secure Multiparty Computation] A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority Yehuda Lindell and Ariel Nof CCS 2017 https://eprint.iacr.org/2017/816 [Secure Outsourcing] IntegriDB: Verifiable SQL for Outsourced Databases. Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. CCS 2015. http://www.ece.umd.edu/~cpap/published/IntegriDB.pdf [Searchable Encryption] Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations Gilad Asharov, Moni Naor, Gil Segev, and Ido Shahaf STOC 2016 https://ia.cr/2016/251 Strengthening the Security of Encrypted Databases: Non-Transitive JOINs Ilya Mironov, Gil Segev, and Ido Shahaf TCC 2017 https://eprint.iacr.org/2017/883 *Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity Seny Kamara and Tarik Moataz Eurocrypt 2017 https://eprint.iacr.org/2017/126 SQL on Structurally-Encrypted Databases Seny Kamara and Tarik Moataz IACR ePrint Article https://eprint.iacr.org/2016/453 Privacy-Preserving Network Provenance Yuankai Zhang, Adam O’Neill, Micah Sherr, and Wenchao Zhou. VLDB 2017 http://people.cs.georgetown.edu/~adam/ppnp.pdf [Signatures] Structure-Preserving Signatures from Standard Assumptions, Revisited. Eike Kiltz, Jiaxin Pan, Hoeteck Wee. Crypto 2015. http://ia.cr/2015/604 Subversion-Resilient Signature Schemes. Giuseppe Ateniese, Bernardo Magri, Daniele Venturi. ACM CCS 2015. http://ia.cr/2015/517 EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes. Georg Fuchsbauer, Christian Hanser, Daniel Slamanig. IACR Cryptology ePrint Archive 2014/944. http://ia.cr/2014/944 [TLS] Zero Round-Trip Time for the Extended Access Control Protocol Jacqueline Brendel and Marc Fischlin European Symposium on Research in Computer Security (ESORICS 2017) https://eprint.iacr.org/2017/060 0-RTT Key Exchange with Full Forward Secrecy Felix Günther, Britta Hale, Tibor Jager, and Sebastian Lauer Eurocrypt 2017 https://eprint.iacr.org/2017/223 [Zero-Knowledge Proofs] *One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin. Jens Groth, Markulf Kohlweiss. EuroCrypt 2015. http://ia.cr/2014/764 *Bulletproofs: Efficient Range Proofs for Confidential Transactions Benedikt Bunz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, and Greg Maxwell Preprint 2017. http://web.stanford.edu/~buenz/pubs/bulletproofs.pdf An Expressive (Zero-Knowledge) Set Accumulator Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou IEEE European Symposium on Security and Privacy (EuroS&P) http://www.umiacs.umd.edu/~zhangyp/papers/accum.pdf