Abstract is missing.
- Trapdoor Hash Functions and Their ApplicationsNico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky. 3-32 [doi]
- CCA Security and Trapdoor Functions via Key-Dependent-Message SecurityFuyuki Kitagawa, Takahiro Matsuda 0002, Keisuke Tanaka. 33-64 [doi]
- Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPsDan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai. 67-97 [doi]
- Non-Uniformly Sound Certificates with Applications to Concurrent Zero-KnowledgeCody Freitag, Ilan Komargodski, Rafael Pass. 98-127 [doi]
- On Round Optimal Statistical Zero Knowledge ArgumentsNir Bitansky, Omer Paneth. 128-156 [doi]
- It Wasn't Me! - Repudiability and Claimability of Ring SignaturesSunoo Park, Adam Sealfon. 159-190 [doi]
- Two-Party ECDSA from Hash Proof Systems and Efficient InstantiationsGuilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker. 191-221 [doi]
- Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End EncryptionNirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, Thomas Ristenpart. 222-250 [doi]
- Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear MapJung Hee Cheon, Wonhee Cho, Minki Hhan, Jiseung Kim 0001, Changmin Lee. 253-283 [doi]
- Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security AmplificationPrabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt 0002, Amit Sahai. 284-332 [doi]
- Watermarking PRFs from Lattices: Stronger Security via Extractable PRFsSam Kim, David J. Wu. 335-366 [doi]
- Watermarking Public-Key Cryptographic PrimitivesRishab Goyal, Sam Kim, Nathan Manohar, Brent Waters, David J. Wu. 367-398 [doi]
- SpOT-Light: Lightweight Private Set Intersection from Sparse OT ExtensionBenny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai. 401-431 [doi]
- Universally Composable Secure Computation with Corrupted TokensNishanth Chandran, Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti. 432-461 [doi]
- Reusable Non-Interactive Secure ComputationMelissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan. 462-488 [doi]
- Efficient Pseudorandom Correlation Generators: Silent OT Extension and MoreElette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl. 489-518 [doi]
- Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, SimultaneouslyFuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka, Takashi Yamakawa. 521-551 [doi]
- Non-interactive Non-malleability from Quantum SupremacyYael Tauman Kalai, Dakshita Khurana. 552-582 [doi]
- Cryptographic SensingYuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai. 583-604 [doi]
- Public-Key Cryptography in the Fine-Grained SettingRio LaVigne, Andrea Lincoln, Virginia Vassilevska Williams. 605-635 [doi]
- Exploring Constructions of Compact NIZKs from Various AssumptionsShuichi Katsumata, Ryo Nishimaki, Shota Yamada 0001, Takashi Yamakawa. 639-669 [doi]
- New Constructions of Reusable Designated-Verifier NIZKsAlex Lombardi, Willy Quach, Ron D. Rothblum, Daniel Wichs, David J. Wu. 670-700 [doi]
- Scalable Zero Knowledge with No Trusted SetupEli Ben-Sasson, Iddo Bentov, Yinon Horesh, Michael Riabzev. 701-732 [doi]
- Libra: Succinct Zero-Knowledge Proofs with Optimal Prover ComputationTiancheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, Dawn Song. 733-764 [doi]
- Highly Efficient Key Exchange Protocols with Optimal TightnessKatriel Cohn-Gordon, Cas Cremers, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager. 767-797 [doi]
- Strong Asymmetric PAKE Based on Trapdoor CKEMTatiana Bradley, Stanislaw Jarecki, Jiayu Xu. 798-825 [doi]
- Broadcast and Trace with N^ε Ciphertext Size from Standard AssumptionsRishab Goyal, Willy Quach, Brent Waters, Daniel Wichs. 826-855 [doi]