Abstract is missing.
- On Homomorphic Secret Sharing from Polynomial-Modulus LWEThomas Attema, Pedro Capitão, Lisa Kohl. 3-32 [doi]
- Discretization Error Reduction for High Precision Torus Fully Homomorphic EncryptionKanghoon Lee, Ji Won Yoon. 33-62 [doi]
- Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting)Giuseppe Ateniese, Long Chen 0018, Danilo Francati, Dimitrios Papadopoulos 0001, Qiang Tang 0005. 63-93 [doi]
- A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial SamplingMarkus Krausz, Georg Land, Jan Richter-Brockmann, Tim Güneysu. 94-124 [doi]
- Private Polynomial Commitments and Applications to MPCRishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Wenxuan Wu, Yupeng Zhang 0001. 127-158 [doi]
- Credibility in Private Set MembershipSanjam Garg, Mohammad Hajiabadi, Abhishek Jain 0002, Zhengzhong Jin, Omkant Pandey, Sina Shiehian. 159-189 [doi]
- Improved Private Set Intersection for Sets with Small EntriesDung Bui, Geoffroy Couteau. 190-220 [doi]
- Pseudorandom Correlation Functions from Variable-Density LPN, RevisitedGeoffroy Couteau, Clément Ducros. 221-250 [doi]
- Threshold Private Set Intersection with Better Communication ComplexitySatrajit Ghosh, Mark Simkin 0001. 251-272 [doi]
- Almost Tightly-Secure Re-randomizable and Replayable CCA-Secure Public Key EncryptionAntonio Faonio, Dennis Hofheinz, Luigi Russo. 275-305 [doi]
- Multi-authority ABE for Non-monotonic Access StructuresMiguel Ambrona, Romain Gay. 306-335 [doi]
- Multi-instance Secure Public-Key EncryptionCarlo Brunetta, Hans Heum, Martijn Stam. 336-367 [doi]
- Unidirectional Updatable Encryption and Proxy Re-encryption from DDHPeihan Miao, Sikhar Patranabis, Gaven J. Watson. 368-398 [doi]
- Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key EncryptionYao Jiang Galteland, Jiaxin Pan. 399-428 [doi]
- Functional Encryption Against Probabilistic Queries: Definition, Construction and ApplicationsGeng Wang, Shi-Feng Sun 0001, Zhedong Wang, Dawu Gu. 429-458 [doi]
- A Generic Transform from Multi-round Interactive Proof to NIZKPierre-Alain Fouque, Adela Georgescu, Chen Qian 0002, Adeline Roux-Langlois, Weiqiang Wen. 461-481 [doi]
- Fine-Grained Verifier NIZK and Its ApplicationsXiangyu Liu, Shengli Liu 0001, Shuai Han 0001, Dawu Gu. 482-511 [doi]
- Zero-Knowledge Arguments for Subverted RSA GroupsDimitris Kolonelos, Mary Maller, Mikhail Volkhov. 512-541 [doi]
- Dew: A Transparent Constant-Sized Polynomial Commitment SchemeArasu Arun, Chaya Ganesh, Satya V. Lokam, Tushar Mopuri, Sriram Sridhar 0001. 542-571 [doi]
- Non-Interactive Publicly-Verifiable Delegation of Committed ProgramsRiddhi Ghosal, Amit Sahai, Brent Waters. 575-605 [doi]
- Laconic Function Evaluation for Turing MachinesNico Döttling, Phillip Gajland, Giulio Malavolta. 606-634 [doi]
- A Map of Witness Maps: New Definitions and ConnectionsSuvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs. 635-662 [doi]
- Structure-Preserving Compilers from New Notions of ObfuscationsMatteo Campanelli, Danilo Francati, Claudio Orlandi. 663-693 [doi]