(Those marked with * have been picked.) You might choose some of the instructor's own papers that were not discussed in the lecture. Some might only be accessible within CUHK network. [Anonymous Credential] MoniPoly --- An Expressive q-SDH-Based Anonymous Attribute-Based Credential System. Syh-Yuan Tan, Thomas Gross. AsiaCrypt 2020. https://ia.cr/2020/587 Anonymity and Rewards in Peer Rating Systems Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso. SCN 2020. https://ia.cr/2020/790 Delegatable Anonymous Credentials from Mercurial Signatures. Elizabeth C. Crites, Anna Lysyanskaya. CT-RSA 2019. https://ia.cr/2018/923 Accumulators with Applications to Anonymity-Preserving Revocation. Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov. IEEE European Symposium on Security and Privacy (EurroS&P) 2017. https://ia.cr/2017/043 Anonymous Attestation with Subverted TPMs. Jan Camenisch, Manu Drijvers, Anja Lehmann. Crypto 2017. https://ia.cr/2017/200 One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian. IEEE Security & Privacy 2017. https://ia.cr/2017/639 *(Un)linkable Pseudonyms for Governmental Databases. Jan Camenisch, Anja Lehmann. CCS 2015. http://www.zurich.ibm.com/pdf/csc/pseudonyms_paper.pdf k-Anonymous Reputation. Sebastian Clau, Stefan Schiffner, Florian Kerschbaum. AsiaCCS 2013. http://www.fkerschbaum.org/asiaccs13.pdf [Applied Cryptography] *Protecting Cryptography Against Compelled Self-Incrimination. Sarah Scheffler, Mayank Varia. Usenix Security 2021. https://www.usenix.org/conference/usenixsecurity21/presentation/scheffler *Identifying Harmful Media in End-to-End Encrypted Communication: Efficient Private Membership Computation. Anunay Kulshrestha, Jonathan Mayer. Usenix Security 2021. https://www.usenix.org/conference/usenixsecurity21/presentation/kulshrestha *Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy. Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh. Usenix Security 2021. https://www.usenix.org/conference/usenixsecurity21/presentation/eskandarian KeyForge: Non-Attributable Email from Forward-Forgeable Signatures. Michael A. Specter, Sunoo Park, Matthew Green Usenix Security 2021. https://www.usenix.org/conference/usenixsecurity21/presentation/specter-keyforge TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control. Lukas Burkhalter, Anwar Hithnawi, Alexander Viand, Hossein Shafagh, Sylvia Ratnasamy. NSDI 2020. https://www.usenix.org/conference/nsdi20/presentation/burkhalter *Talek: Private Group Messaging with Hidden Access Patterns. Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas Anderson, Arvind Krishnamurthy, Bryan Parno. ACSAC 2020. https://ia.cr/2020/066 An Airdrop that Preserves Recipient Privacy. Riad S. Wahby, Dan Boneh, Christopher Jeffrey, Joseph Poon. FC 2020. https://ia.cr/2020/676 *Traceback for End-to-End Encrypted Messaging. Nirvan Tyagi, Ian Miers, Thomas Ristenpart. CCS 2019. https://ia.cr/2019/981 Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption. Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, Thomas Ristenpart. CRYPTO 2019. https://ia.cr/2019/565 The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol. Jol Alwen, Sandro Coretti, Yevgeniy Dodis. EuroCrypt 2019. https://ia.cr/2018/1037 [Blockchain] Can a Public Blockchain Keep a Secret? Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin. TCC 2020. https://ia.cr/2020/464 MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies. Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate. PoPETS 2020. https://doi.org/10.2478/popets-2020-0058 Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage. Matteo Campanelli, Dario Fiore, Nicola Greco, Dimitris Kolonelos, Luca Nizzardo. AsiaCrypt 2020. https://ia.cr/2020/149 Aggregatable Subvector Commitments for Stateless Cryptocurrencies. Alin Tomescu, Ittai Abraham, Vitalik Buterin, Justin Drake, Dankrad Feist, Dmitry Khovratovich. SCN 2020. https://ia.cr/2020/527 *Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains. Dan Boneh, Benedikt Bunz, Ben Fisch. Crypto 2019. https://ia.cr/2018/1188 Edrax: A Cryptocurrency with Stateless Transaction Validation. Alexander Chepurnoy, Charalampos Papamanthou, Shravan Srinivasan, Yupeng Zhang. IACR Cryptology ePrint Archive. https://ia.cr/2018/968 Publicly Verifiable Proofs from Blockchains. Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti. PKC 2019. https://ia.cr/2019/066 *A Survey of Two Verifiable Delay Functions. Dan Boneh, Benedikt Bnz, Ben Fisch. IACR Cryptology ePrint Archive. https://ia.cr/2018/712 *Compact Multi-Signatures for Smaller Blockchains. Dan Boneh, Manu Drijvers, Gregory Neven. AsiaCrypt 2018. https://ia.cr/2018/483 [Broadcast Encryption and Traitor Tracing] Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions. Sam Kim, David J. Wu AsiaCrypt 2020. https://ia.cr/2019/984 New Techniques for Traitor Tracing: Size N^{1/3} and More from Pairings. Mark Zhandry. Crypto 2020. https://ia.cr/2020/954 A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes. Xuan Thanh Do, Duong Hieu Phan, Moti Yung. ACNS 2020. https://ia.cr/2020/826 [Contact Tracing] Catalic: Delegated PSI Cardinality with Applications to Contact Tracing. Thai Duong, Duong Hieu Phan, Ni Trieu. AsiaCrypt 2020. https://ia.cr/2020/1105 Practical Over-Threshold Multi-Party Private Set Intersection. Rasoul Akhavan Mahdavi, Thomas Humphries, Bailey Kacsmar, Simeon Krastnikov, Nils Lukas, John Abraham Premkumar, Masoumeh Shafieinejad, Simon Oya, Florian Kerschbaum, Erik-Oliver Blass. ACSAC 2020. http://www.fkerschbaum.org/acsac20.pdf Privacy-Preserving Automated Exposure Notification. Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, Daniel J. Weitzner. IACR Cryptology ePrint Archive. https://ia.cr/2020/863 Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System. Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti. IACR Cryptology ePrint Archive. https://ia.cr/2020/493 [Cryptocurrency/E-Cash] Transferable E-cash: A Cleaner Model and the First Practical Instantiation. Balthazar Bauer, Georg Fuchsbauer, Chen Qian. IACR Cryptology ePrint Archive. https://ia.cr/2020/1400 Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble. Georg Fuchsbauer, Michele Orr, Yannick Seurin. IACR Cryptology ePrint Archive. https://ia.cr/2018/1039 A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence. Bingsheng Zhang, Roman Oliynykov, Hamed Balogun. NDSS 2019. https://ia.cr/2018/435 [Cryptographic Primitives] *Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation. Yilei Chen, Minki Hhan, Vinod Vaikuntanathan, Hoeteck Wee. TCC 2019. https://ia.cr/2019/1085 A Generic Approach to Constructing and Proving Verifiable Random Functions. Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters. TCC 2017. https://ia.cr/2017/021 *Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model. Susan Hohenberger, Venkata Koppula, Brent Waters. AsiaCrypt 2015. https://ia.cr/2014/521 Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions. Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong. ACISP 2012. https://ia.cr/2012/213 *A New RFID Privacy Model. Jens Hermans, Andreas Pashalidis, Frederik Vercauteren, Bart Preneel. ESORICS 2011. https://www.esat.kuleuven.be/cosic/publications/article-2028.pdf [Elections] *BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme. Pyrros Chaidos, Vronique Cortier, Georg Fuchsbauer, David Galindo. CCS 2016. https://hal.inria.fr/hal-01377917 *SoK: A comprehensive analysis of game-based ballot privacy definitions. David Bernhard, Veronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi. IEEE Security and Privacy 2015. https://oaklandsok.github.io/papers/bernhard2014.pdf SoK: Verifiability Notions for E-Voting Protocols. Veronique Cortier, David Galindo, Ralf Kusters, Johannes Muller, Tomasz Truderung. IEEE Security and Privacy 2016. https://www.ieee-security.org/TC/SP2016/papers/0824a779.pdf Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme. David Bernhard, Oksana Kulyk, Melanie Volkamer. ACM Availability, Reliability and Security (ARES) 2017 https://ia.cr/2016/431 [Group/Ring Signatures] *Post-Quantum EPID Signatures from Symmetric Primitives. Dan Boneh, Saba Eskandarian, Ben Fisch. CT-RSA 2019. https://ia.cr/2018/261 Highly-Efficient Fully-Anonymous Dynamic Group Signatures. David Derler, Daniel Slamanig. AsiaCCS 2018. https://ia.cr/2016/154 *Efficient Ring Signature in the Standard Model. AsiaCrypt 2017. https://www.iacr.org/archive/asiacrypt2017/106240313/106240313.pdf Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication. Vireshwar Kumar, He Li, Jung-Min (Jerry) Park, Kaigui Bian, Yaling Yang. CCS 2015. https://winser.ece.vt.edu/wp-content/uploads/2018/04/group_signatures.pdf Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions. Benoit Libert, Thomas Peters, Moti Yung. Crypto 2015. https://ia.cr/2015/743 [Identity/Attribute-based Encryption (Functional Encryption)] Traceable Inner Product Functional Encryption. Xuan Thanh Do, Duong Hieu Phan, David Pointcheval. CT-RSA 2020. https://ia.cr/2019/1358 Downgradable Identity-Based Encryption and Applications. Olivier Blazy, Paul Germouty, Duong Hieu Phan. CT-RSA 2019. https://ia.cr/2018/1176 Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality. Manuel Barbosa, Dario Catalano, Azam Soleimanian, Bogdan Warinschi. CT-RSA 2019. http://www.fentec.eu/content/efficient-function-hiding-functional-encryption-inner-products-orthogonality Registration-Based Encryption from Standard Assumptions. Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, Sruthi Sekar. PKC 2019. https://ia.cr/2018/1030 Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions. Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee. CCS 2017. https://ia.cr/2017/983 FAME: Fast Attribute-based Message Encryption. Shashank Agrawal, Melissa Chase. CCS 2017. https://ia.cr/2017/807 [Key Exchange] Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism. Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He. AsiaCrypt 2018. https://ia.cr/2018/817 [Oblivious RAM] *Path ORAM: an extremely simple oblivious RAM protocol Emil Stefanov, Marten van Dijk, Elaine Shi, T-H. Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas. CCS 2013. https://eprint.iacr.org/2013/280 *Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset. Thang Hoang, Muslum Ozgur Ozmen, Yeongjin Jang, Attila A. Yavuz. Privacy Enhancing Technologies Symposium (PETS) 2019. https://ia.cr/2018/247 [Searchable Encryption] Forward and Backward Private Conjunctive Searchable Symmetric Encryption. Sikhar Patranabis, Debdeep Mukhopadhyay. NDSS 2021. https://eprint.iacr.org/2020/1342 SWiSSSE: System-Wide Security for Searchable Symmetric Encryption. Zichen Gui, Kenneth G. Paterson, Sikhar Patranabis, Bogdan Warinschi. IACR Cryptology ePrint Archive. https://ia.cr/2020/1328 Privacy-Preserving Pattern Matching on Encrypted Data. Anis Bkakria, Nora Cuppens, Frdric Cuppens. AsiaCrypt 2020. https://ia.cr/2020/422 *Encrypted Blockchain Databases. Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz. AFT 2020. https://ia.cr/2020/827 Computationally Volume-Hiding Structured Encryption (or Encrypted Multi-Maps with Computationally-Secure Leakage). Seny Kamara, Tarik Moataz. EuroCrypt 2019. https://ia.cr/2018/978 Structured Encryption and Leakage Suppression. Seny Kamara, Tarik Moataz, Olga Ohrimenko. Crypto 2018. https://ia.cr/2018/551 Parameter-Hiding Order Revealing Encryption. David Cash, Feng-Hao Liu, Adam O'Neill, Mark Zhandry, Cong Zhang. AsiaCrypt 2018. https://ia.cr/2018/698 SQL on Structurally-Encrypted Databases. Seny Kamara, Tarik Moataz. AsiaCrypt 2018. https://ia.cr/2016/453 Pattern Matching on Encrypted Streams. Nicolas Desmoulins, Pierre-Alain Fouque, Cristina Onete, Olivier Sanders. AsiaCrypt 2018. https://ia.cr/2017148 Strengthening the Security of Encrypted Databases: Non-Transitive JOINs. Ilya Mironov, Gil Segev, Ido Shahaf. TCC 2017. https://ia.cr/2017/883 *Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations. Gilad Asharov, Moni Naor, Gil Segev, Ido Shahaf. STOC 2016. https://ia.cr/2016/251 [Secure Machine Learning] SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh. IACR Cryptology ePrint Archive. https://ia.cr/2020/592 CrypTFlow2: Practical 2-Party Secure Inference. Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma. CCS 2020. https://ia.cr/2020/1002 FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning. Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, Tal Rabin. PETS 2021. https://doi.org/10.2478/popets-2021-0011 *Falcon: Fast Spectral Inference on Encrypted Data. Qian Lou, Wen-jie Lu, Cheng Hong, Lei Jiang. NIPS 2020. https://papers.nips.cc/paper/2020/file/18fc72d8b8aba03a4d84f66efabce82e-Paper.pdf *FALCON: A Fourier Transform Based Approach for Fast and Secure Convolutional Neural Network Predictions. Shaohua Li, Kaiping Xue, Chenkai Ding, Xindi Gao, David S L Wei, Tao Wan, Feng Wu. CVPR 2020. https://arxiv.org/abs/1811.08257 *ENSEI: Efficient Secure Inference via Frequency-Domain Homomorphic Convolution for Privacy-Preserving Visual Recognition. Song Bian, Tianchen Wang, Masayuki Hiromoto, Yiyu Shi, Takashi Sato. CVPR 2020. https://arxiv.org/abs/2003.05328 *Glyph: Fast and Accurately Training Deep Neural Networks on Encrypted Data. Qian Lou, Bo Feng, Geoffrey Charles Fox, Lei Jiang. NeurIPS 2020. https://papers.nips.cc/paper/2020/hash/685ac8cadc1be5ac98da9556bc1c8d9e-Abstract.html *TransNet: Training Privacy-Preserving Neural Network over Transformed Layer. Qijian He, Wei Yang, Bingren Chen, Yangyang Geng, Liusheng Huang. VLDB 2020. http://www.vldb.org/pvldb/vol13/p1849-he.pdf *Partially Encrypted Machine Learning using Functional Encryption Theo Ryffel, Edouard Dufour-Sans, Romain Gay, Francis Bach, David Pointcheval. NeurIPS 2019 Poster. https://arxiv.org/abs/1905.10214 *SoK: Modular and Efficient Private Decision Tree Evaluation. Agnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider. PETS 2019. https://doi.org/10.2478/popets-2019-0026 Practical Privacy-Preserving K-means Clustering. Payman Mohassel, Mike Rosulek, Ni Trieu. PETS 2019. https://doi.org/10.2478/popets-2020-0080 Secure k-ish Nearest Neighbors Classifier. Hayim Shaul, Dan Feldman, Daniela Rus. PETS 2019. https://doi.org/10.2478/popets-2020-0045 [Secure Multi-Party Computation] Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application. Satsuya Ohata, Koji Nuida. FC 2020. https://arxiv.org/abs/1907.03415 Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing. ACNS 2019. Aner Ben Efraim, Michael Nielsen, Eran Omri. https://ia.cr/2019/080 Multi-clients Verifiable Computation via Conditional Disclosure of Secrets Rishabh Bhadauria, Carmit Hazay. SCN 2020. https://link.springer.com/chapter/10.1007/978-3-030-57990-6_8 Secure Multiparty Computation from SGX. Raad Bahmani, Manuel Barbosa, Ferdinand Brasser, Bernardo Portela, Ahmad-Reza Sadeghi, Guillaume Scerri, Bogdan Warinschi. FC 2017. https://ia.cr/2016/1057 Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates. Samee Zahur, Mike Rosulek, David Evans. Eurocrypt 2015. https://ia.cr/2014/756 A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority. Yehuda Lindell, Ariel Nof. CCS 2017. https://ia.cr/2017/816 [Signatures] Stronger Security and Constructions of Multi-Designated Verifier Signatures. Ivan Damgrd, Helene Haagh, Rebekah Mercer, Anca Nitulescu, Claudio Orlandi, Sophia Yakoubov. TCC 2020. https://ia.cr/2019/1153 Surnaming Schemes, Fast Verification, and Applications to SGX Technology. Dan Boneh, Shay Gueron. CT-RSA 2017. https://doi.org/10.1007/978-3-319-52153-4_9 Structure-Preserving Signatures from Standard Assumptions, Revisited. Eike Kiltz, Jiaxin Pan, Hoeteck Wee. Crypto 2015. https://ia.cr/2015/604 Subversion-Resilient Signature Schemes. Giuseppe Ateniese, Bernardo Magri, Daniele Venturi. CCS 2015. https://ia.cr/2015/517 EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes. Georg Fuchsbauer, Christian Hanser, Daniel Slamanig. IACR Cryptology ePrint Archive. https://ia.cr/2014/944 [Symmetric-Key Encryption] *KEM Combiners. Federico Giacon, Felix Heuer, Bertram Poettering. PKC 2018. https://ia.cr/2018/024 DiSE: Distributed Symmetric-key Encryption. Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal. CCS 2018. https://ia.cr/2018/727 [Updatable Encryption] Improving Speed and Security in Updatable Encryption Schemes. Dan Boneh, Saba Eskandarian, Sam Kim, Maurice Shih. AsiaCrypt 2020. https://ia.cr/2020/222 Determining the Core Primitive for Optimally Secure Ratcheting. Fatih Balli, Paul Rsler, Serge Vaudenay. AsiaCrypt 2020. https://ia.cr/2020/148 The Direction of Updatable Encryption does not Matter Much. Yao Jiang. AsiaCrypt 2020. https://ia.cr/2020/622 Fast and Secure Updatable Encryption. Colin Boyd, Gareth T. Davies, Kristian Gjsteen, Yao Jiang Crypto 2020. https://ia.cr/2019/1457 [TLS] Zero Round-Trip Time for the Extended Access Control Protocol. Jacqueline Brendel, Marc Fischlin. European Symposium on Research in Computer Security (ESORICS) 2017. https://ia.cr/2017/060 0-RTT Key Exchange with Full Forward Secrecy. Felix Gnther, Britta Hale, Tibor Jager, Sebastian Lauer. EuroCrypt 2017. https://ia.cr/2017/223 [Zero-Knowledge Proofs] Bulletproofs: Efficient Range Proofs for Confidential Transactions. Benedikt Bunz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Greg Maxwell IEEE Security & Privacy 2018. http://web.stanford.edu/~buenz/pubs/bulletproofs.pdf *Scaling Verifiable Computation Using Efficient Set Accumulators. Alex Ozdemir, Riad S. Wahby, Barry Whitehat, Dan Boneh. Usenix Security 2020. https://ia.cr/2019/1494 An Expressive (Zero-Knowledge) Set Accumulator. Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou. IEEE European Symposium on Security and Privacy (EuroS&P) 2017. http://www.umiacs.umd.edu/~zhangyp/papers/accum.pdf DIZK: A Distributed Zero Knowledge Proof System. Howard Wu, Wenting Zheng, Alessandro Chiesa, Raluca Ada Popa, Ion Stoica. Usenix Security 2018. https://ia.cr/2018/691