Abstract is missing.
- A Modular Approach to Unclonable CryptographyPrabhanjan Ananth, Amit Behera. 3-37 [doi]
- Unconditionally Secure Quantum Commitments with PreprocessingLuowen Qian. 38-58 [doi]
- Unconditionally Secure Commitments with Quantum Auxiliary InputsTomoyuki Morimae, Barak Nehoran, Takashi Yamakawa. 59-92 [doi]
- Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way FunctionsFuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa. 93-125 [doi]
- Robust Quantum Public-Key Encryption with Applications to Quantum Key DistributionGiulio Malavolta, Michael Walter. 126-151 [doi]
- How (not) to Build Quantum PKE in MinicryptLongcheng Li, Qian Li, Xingjian Li 0006, Qipeng Liu 0001. 152-183 [doi]
- Secret Sharing with Certified DeletionJames Bartusek, Justin Raizes. 184-214 [doi]
- On Central Primitives for Quantum Cryptography with Classical CommunicationKai-Min Chung, Eli Goldin, Matthew Gray. 215-248 [doi]
- Adaptively Secure BLS Threshold Signatures from DDH and co-CDHSourav Das, Ling Ren 0001. 251-284 [doi]
- Round-Optimal, Fully Secure Distributed Key GenerationJonathan Katz. 285-316 [doi]
- Accountability for Misbehavior in Threshold Decryption via Threshold Traitor TracingDan Boneh, Aditi Partap, Lior Rotem. 317-351 [doi]
- Threshold Encryption with Silent SetupSanjam Garg, Dimitris Kolonelos, Guru-Vamsi Policharla, Mingyuan Wang 0001. 352-386 [doi]
- Two-Round Threshold Signature from Algebraic One-More Learning with ErrorsThomas Espitau, Shuichi Katsumata, Kaoru Takemure. 387-424 [doi]
- Flood and Submerse: Distributed Key Generation and Robust Threshold Signature from LatticesThomas Espitau, Guilhem Niot, Thomas Prest. 425-458 [doi]
- Adaptively Secure 5 Round Threshold Signatures from MLWE/MSIS and DL with RewindingShuichi Katsumata, Michael Reichle, Kaoru Takemure. 459-491 [doi]