Abstract is missing.
- Post-quantum Insecurity from LWEAlex Lombardi, Ethan Mook, Willy Quach, Daniel Wichs. 3-32 [doi]
- Adaptive Versus Static Multi-oracle Algorithms, and Quantum Security of a Split-Key PRFJelle Don, Serge Fehr, Yu-Hsuan Huang. 33-51 [doi]
- The Parallel Reversible Pebbling Game: Analyzing the Post-quantum Security of iMHFsJeremiah Blocki, Blake Holman, Seunghoon Lee. 52-79 [doi]
- Quantum Rewinding for Many-Round ProtocolsRussell W. F. Lai, Giulio Malavolta, Nicholas Spooner. 80-109 [doi]
- Fiat-Shamir Transformation of Multi-round Interactive ProofsThomas Attema, Serge Fehr, Michael Klooß. 113-142 [doi]
- Steganography-Free Zero-KnowledgeBehzad Abdolmaleki, Nils Fleischhacker, Vipul Goyal, Abhishek Jain 0002, Giulio Malavolta. 143-172 [doi]
- Vector Commitments over Rings and Compressed $\varSigma $-ProtocolsThomas Attema, Ignacio Cascudo, Ronald Cramer, Ivan Damgård, Daniel Escudero 0001. 173-202 [doi]
- Universally Composable $\varSigma $-protocols in the Global Random-Oracle ModelAnna Lysyanskaya, Leah Namisa Rosenbloom. 203-233 [doi]
- Pseudorandom (Function-Like) Quantum State Generators: New Definitions and ApplicationsPrabhanjan Ananth, Aditya Gulati, Luowen Qian, Henry Yuen. 237-265 [doi]
- Candidate Trapdoor Claw-Free Functions from Group Actions with Applications to Quantum ProtocolsNavid Alamati, Giulio Malavolta, Ahmadreza Rahimi. 266-293 [doi]
- Collusion Resistant Copy-Protection for Watermarkable FunctionalitiesJiahui Liu, Qipeng Liu, Luowen Qian, Mark Zhandry. 294-323 [doi]
- On Secret Sharing, Randomness, and Random-less Reductions for Secret SharingDivesh Aggarwal, Eldon Chung, Maciej Obremski, João L. Ribeiro 0001. 327-354 [doi]
- Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage FamilyHemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang, Xiuyu Ye, Albert Yu. 355-383 [doi]
- Asymptotically Free Broadcast in Constant Expected Time via Packed VSSIttai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra. 384-414 [doi]
- On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key PrimitivesLaasya Bangalore, Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam. 417-446 [doi]
- A Toolbox for Barriers on Interactive Oracle ProofsGal Arnon, Amey Bhangale, Alessandro Chiesa, Eylon Yogev. 447-466 [doi]
- Scalable and Transparent Proofs over All Large Fields, via Elliptic Curves - (ECFFT Part II)Eli Ben-Sasson, Dan Carmon, Swastik Kopparty, David Levit. 467-496 [doi]
- Doubly Efficient Interactive Proofs over Infinite and Non-commutative RingsEduardo Soria-Vazquez. 497-525 [doi]
- Fully Succinct Batch Arguments for sfNP from Indistinguishability ObfuscationRachit Garg 0001, Kristin Sheridan, Brent Waters, David J. Wu 0001. 526-555 [doi]
- Lower Bounds for the Number of Decryption Updates in Registration-Based EncryptionMohammad Mahmoody, Wei Qi, Ahmadreza Rahimi. 559-587 [doi]
- IBE with Incompressible Master Secret and Small Identity SecretsNico Döttling, Sanjam Garg, Sruthi Sekar, Mingyuan Wang. 588-617 [doi]
- Bounded Functional Encryption for Turing Machines: Adaptive Security from General AssumptionsShweta Agrawal, Fuyuki Kitagawa, Anuja Modi, Ryo Nishimaki, Shota Yamada 0001, Takashi Yamakawa. 618-647 [doi]
- Multi-authority ABE from Lattices Without Random OraclesBrent Waters, Hoeteck Wee, David J. Wu 0001. 651-679 [doi]
- ABE for Circuits with Constant-Size Secret Keys and Adaptive SecurityHanjun Li, Huijia Lin, Ji Luo 0002. 680-710 [doi]
- Multi-Input Quadratic Functional Encryption: Stronger Security, Broader FunctionalityShweta Agrawal, Rishab Goyal, Junichi Tomida. 711-740 [doi]