Abstract is missing.
- Static vs. Adaptive Security in Perfect MPC: A Separation and the Adaptive Security of BGWGilad Asharov, Ran Cohen, Oren Shochat. [doi]
- A Note on the Complexity of Private Simultaneous Messages with Many PartiesMarshall Ball, Tim Randolph. [doi]
- A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space TradeoffLior Rotem, Gil Segev 0001. [doi]
- On the Distributed Discrete Logarithm Problem with PreprocessingPavel Hubácek, L'ubica Jancová, Veronika Králová. [doi]
- Multiparty Computation with Covert Security and Public VerifiabilityPeter Scholl, Mark Simkin 0001, Luisa Siniscalchi. [doi]
- Universally Composable Almost-Everywhere Secure ComputationNishanth Chandran, Pouyan Forghani, Juan A. Garay, Rafail Ostrovsky, Rutvik Patel, Vassilis Zikas. [doi]
- Revisiting Collision and Local Opening Analysis of ABR HashChandranan Dhar, Yevgeniy Dodis, Mridul Nandi. [doi]
- Information-Theoretic Distributed Point FunctionsElette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov. [doi]
- Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPCSaikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, Daniel Wichs. [doi]
- On Seedless PRNGs and Premature NextSandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, Stefano Tessaro. [doi]
- Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and MoreCarmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss. [doi]
- From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-TheoreticVarun Madathil, Chris Orsini, Alessandra Scafuro, Daniele Venturi 0001. [doi]
- Maliciously Circuit-Private FHE from Information-Theoretic PrinciplesNico Döttling, Jesko Dujmovic. [doi]
- Property-Preserving Hash Functions and Combinatorial Group TestingKazuhiko Minematsu. [doi]
- Multi-Server PIR with Full Error Detection and Limited Error CorrectionReo Eriguchi, Kaoru Kurosawa, Koji Nuida. [doi]
- Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its ConsequencesHemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang, Xiuyu Ye, Albert Yu. [doi]
- Front Matter, Table of Contents, Preface, Conference Organization [doi]
- Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear GroupsLior Rotem. [doi]