Abstract is missing.
- Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge ProofsCarmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss. 3-33 [doi]
- Your Reputation's Safe with Me: Framing-Free Distributed Zero-Knowledge ProofsCarmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss. 34-64 [doi]
- Locally Verifiable Distributed SNARGsEden Aldema Tshuva, Elette Boyle, Ran Cohen, Tal Moran, Rotem Oshman. 65-90 [doi]
- Distributed-Prover Interactive ProofsSourav Das, Rex Fernando, Ilan Komargodski, Elaine Shi, Pratik Soni. 91-120 [doi]
- Rogue-Instance Security for Batch Knowledge ProofsGil Segev 0001, Amit Sharabi, Eylon Yogev. 121-157 [doi]
- On Black-Box Verifiable OutsourcingAmit Agarwal, Navid Alamati, Dakshita Khurana, Srinivasan Raghuraman, Peter Rindal. 158-187 [doi]
- Counting Unpredictable Bits: A Simple PRG from One-Way FunctionsNoam Mazor, Rafael Pass. 191-218 [doi]
- On One-Way Functions and Sparse LanguagesYanyi Liu, Rafael Pass. 219-237 [doi]
- Security Proofs for Key-Alternating Ciphers with Non-Independent Round PermutationsLiqing Yu, Yusai Wu, Yu Yu 0001, Zhenfu Cao, Xiaolei Dong. 238-267 [doi]
- Public-Key Encryption, Local Pseudorandom Generators, and the Low-Degree MethodAndrej Bogdanov, Pravesh K. Kothari, Alon Rosen. 268-285 [doi]
- Cryptography from Planted Graphs: Security with Logarithmic-Size MessagesDamiano Abram, Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan. 286-315 [doi]
- Randomized Functions with High Round ComplexitySaugata Basu, Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen. 319-348 [doi]
- Towards Topology-Hiding Computation from Oblivious TransferMarshall Ball, Alexander Bienstock, Lisa Kohl, Pierre Meyer. 349-379 [doi]
- On the Impossibility of Surviving (Iterated) Deletion of Weakly Dominated Strategies in Rational MPCJohannes Blömer, Jan Bobolz, Henrik Bröcher. 380-410 [doi]
- Synchronizable Fair ExchangeRanjit Kumaresan, Srinivasan Raghuraman, Adam Sealfon. 411-440 [doi]
- DORAM Revisited: Maliciously Secure RAM-MPC with Logarithmic OverheadBrett Hemenway, Daniel Noble, Rafail Ostrovsky, Matan Shtepel, Jacob Zhang. 441-470 [doi]
- 3-Party Secure Computation for RAMs: Optimal and Concretely EfficientAtsunori Ichikawa, Ilan Komargodski, Koki Hamada, Ryo Kikuchi, Dai Ikarashi. 471-502 [doi]