- **Cryptography and Computer Security: A View From the Year 2100** https://dl.acm.org/doi/10.1145/3658644.3690378 Dan Boneh ### Zero Knowledge Proofs - **Dora: A Simple Approach to Zero-Knowledge for RAM Programs** https://dl.acm.org/doi/10.1145/3658644.3690213 Aarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk - **Dual Polynomial Commitment Schemes and Applications to Commit-and-Prove SNARKs** https://dl.acm.org/doi/10.1145/3658644.3690219 Chaya Ganesh, Vineet Nair, Ashish Sharma - **Direct Range Proofs for Paillier Cryptosystem and Their Applications** https://dl.acm.org/doi/10.1145/3658644.3690261 Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, Siu-Ming Yiu - **Conan: Distributed Proofs of Compliance for Anonymous Data Collection** https://dl.acm.org/doi/10.1145/3658644.3690264 Mingxun Zhou, Giulia Fanti, Elaine Shi - **Hekaton: Horizontally-Scalable zkSNARKs via Proof Aggregation** https://dl.acm.org/doi/10.1145/3658644.3690282 Michael Rosenberg, Tushar Mopuri, Hossein Hafezi, Ian Miers, Pratyush Mishra - **GRandLine: Adaptively Secure DKG and Randomness Beacon with (Log-)Quadratic Communication Complexity** https://dl.acm.org/doi/10.1145/3658644.3690287 Renas Bacho, Christoph Lenzen, Julian Loss, Simon Ochsenreither, Dimitrios Papachristoudis - **Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction** https://dl.acm.org/doi/10.1145/3658644.3690289 Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam - **Sparrow : Space-Efficient zkSNARK for Data-Parallel Circuits and Applications to Zero-Knowledge Decision Trees** https://dl.acm.org/doi/10.1145/3658644.3690318 Christodoulos Pappas, Dimitrios Papadopoulos - **The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe Privacy** https://dl.acm.org/doi/10.1145/3658644.3690330 Vadim Lyubashevsky, Gregor Seiler, Patrick Steuer - **Real-World Universal zkSNARKs are Non-Malleable** https://dl.acm.org/doi/10.1145/3658644.3690351 Antonio Faonio, Dario Fiore, Luigi Russo - **A Succinct Range Proof for Polynomial-based Vector Commitment** https://dl.acm.org/doi/10.1145/3658644.3670324 Rui Gao, Zhiguo Wan, Yuncong Hu, Huaqun Wang - **LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices** https://dl.acm.org/doi/10.1145/3658644.3670345 Ron Steinfeld, Amin Sakzad, Muhammed F. Esgin, Veronika Kuchta, Mert Yassi, Raymond K. Zhao - **zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials** https://dl.acm.org/doi/10.1145/3658644.3690356 Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Yan Ji, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Mahdi Sedaghat, Joy Wang - **Batching-Efficient RAM using Updatable Lookup Arguments** https://dl.acm.org/doi/10.1145/3658644.3670356 Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, Nitin Singh - **Multi-Verifier Zero-Knowledge Proofs for Any Constant Fraction of Corrupted Verifiers** https://dl.acm.org/doi/10.1145/3658644.3670357 Daniel Escudero, Antigoni Polychroniadou, Yifan Song, Chenkai Weng ### Signatures, Proofs, Integrity - **Functional Adaptor Signatures: Beyond All-or-Nothing Blockchain-based Payments** https://dl.acm.org/doi/10.1145/3658644.3690240 Nikhil Vanjani, Pratik Soni, Sri AravindaKrishnan Thyagarajan - **Blind Multi-Signatures for Anonymous Tokens with Decentralized Issuance and Public Verifiability** https://dl.acm.org/doi/10.1145/3658644.3690364 Ioanna Karantaidou, Omar Renawi, Foteini Baldimtsi, Nikolaos Kamarinakis, Jonathan Katz, Julian Loss - **Practical Post-Quantum Signatures for Privacy** https://dl.acm.org/doi/10.1145/3658644.3670297 Sven Argo, Tim Güneysu, Corentin Jeudy, Georg Land, Adeline Roux-Langlois, Olivier Sanders - **Reckle Trees: Updatable Merkle Batch Proofs with Applications** https://dl.acm.org/doi/10.1145/3658644.3670354 Charalampos Papamanthou, Shravan Srinivasan, Nicolas Gailly, Ismael Hishon-Rezaizadeh, Andrus Salumets, Stjepan Golemac - **Provable Security for PKI Schemes** https://dl.acm.org/doi/10.1145/3658644.3670374 Sara Wrótniak, Hemi Leibowitz, Ewa Syta, Amir Herzberg - **Fast Two-party Threshold ECDSA with Proactive Security** https://dl.acm.org/doi/10.1145/3658644.3670387 Brian Koziel, S. Dov Gordon, Craig Gentry - **Batch Range Proof: How to Make Threshold ECDSA More Efficient** https://dl.acm.org/doi/10.1145/3658644.3670287 Guofeng Tang, Shuai Han, Li Lin, Changzheng Wei, Ying Yan - **RSA-Based Dynamic Accumulator without Hashing into Primes** https://dl.acm.org/doi/10.1145/3658644.3690199 Victor Youdom Kemmoe, Anna Lysyanskaya - **Non-interactive VSS using Class Groups and Application to DKG** https://dl.acm.org/doi/10.1145/3658644.3670312 Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Hamza Saleem, Sri Aravinda Krishnan Thyagarajan - **zkPi: Proving Lean Theorems in Zero-Knowledge** https://dl.acm.org/doi/10.1145/3658644.3670322 Evan Laufer, Alex Ozdemir, Dan Boneh - **Zero-Knowledge Proofs of Training for Deep Neural Networks** https://dl.acm.org/doi/10.1145/3658644.3670316 Kasra Abbaszadeh, Christodoulos Pappas, Jonathan Katz, Dimitrios Papadopoulos