- **Cryptography and Computer Security: A View From the Year 2100** https://dl.acm.org/doi/10.1145/3658644.3690378 Dan Boneh
### Zero Knowledge Proofs
- **Dora: A Simple Approach to Zero-Knowledge for RAM Programs** https://dl.acm.org/doi/10.1145/3658644.3690213 Aarushi Goel, Mathias Hall-Andersen, Gabriel Kaptchuk
- **Dual Polynomial Commitment Schemes and Applications to Commit-and-Prove SNARKs** https://dl.acm.org/doi/10.1145/3658644.3690219 Chaya Ganesh, Vineet Nair, Ashish Sharma
- **Direct Range Proofs for Paillier Cryptosystem and Their Applications** https://dl.acm.org/doi/10.1145/3658644.3690261 Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, Siu-Ming Yiu
- **Conan: Distributed Proofs of Compliance for Anonymous Data Collection** https://dl.acm.org/doi/10.1145/3658644.3690264 Mingxun Zhou, Giulia Fanti, Elaine Shi
- **Hekaton: Horizontally-Scalable zkSNARKs via Proof Aggregation** https://dl.acm.org/doi/10.1145/3658644.3690282 Michael Rosenberg, Tushar Mopuri, Hossein Hafezi, Ian Miers, Pratyush Mishra
- **GRandLine: Adaptively Secure DKG and Randomness Beacon with (Log-)Quadratic Communication Complexity** https://dl.acm.org/doi/10.1145/3658644.3690287 Renas Bacho, Christoph Lenzen, Julian Loss, Simon Ochsenreither, Dimitrios Papachristoudis
- **Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction** https://dl.acm.org/doi/10.1145/3658644.3690289 Yibin Yang, David Heath, Carmit Hazay, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam
- **Sparrow : Space-Efficient zkSNARK for Data-Parallel Circuits and Applications to Zero-Knowledge Decision Trees** https://dl.acm.org/doi/10.1145/3658644.3690318 Christodoulos Pappas, Dimitrios Papadopoulos
- **The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe Privacy** https://dl.acm.org/doi/10.1145/3658644.3690330 Vadim Lyubashevsky, Gregor Seiler, Patrick Steuer
- **Real-World Universal zkSNARKs are Non-Malleable** https://dl.acm.org/doi/10.1145/3658644.3690351 Antonio Faonio, Dario Fiore, Luigi Russo
- **A Succinct Range Proof for Polynomial-based Vector Commitment** https://dl.acm.org/doi/10.1145/3658644.3670324 Rui Gao, Zhiguo Wan, Yuncong Hu, Huaqun Wang
- **LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices** https://dl.acm.org/doi/10.1145/3658644.3670345 Ron Steinfeld, Amin Sakzad, Muhammed F. Esgin, Veronika Kuchta, Mert Yassi, Raymond K. Zhao
- **zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials** https://dl.acm.org/doi/10.1145/3658644.3690356 Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Yan Ji, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Mahdi Sedaghat, Joy Wang
- **Batching-Efficient RAM using Updatable Lookup Arguments** https://dl.acm.org/doi/10.1145/3658644.3670356 Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Shubh Prakash, Nitin Singh
- **Multi-Verifier Zero-Knowledge Proofs for Any Constant Fraction of Corrupted Verifiers** https://dl.acm.org/doi/10.1145/3658644.3670357 Daniel Escudero, Antigoni Polychroniadou, Yifan Song, Chenkai Weng
### Signatures, Proofs, Integrity
- **Functional Adaptor Signatures: Beyond All-or-Nothing Blockchain-based Payments** https://dl.acm.org/doi/10.1145/3658644.3690240 Nikhil Vanjani, Pratik Soni, Sri AravindaKrishnan Thyagarajan
- **Blind Multi-Signatures for Anonymous Tokens with Decentralized Issuance and Public Verifiability** https://dl.acm.org/doi/10.1145/3658644.3690364 Ioanna Karantaidou, Omar Renawi, Foteini Baldimtsi, Nikolaos Kamarinakis, Jonathan Katz, Julian Loss
- **Practical Post-Quantum Signatures for Privacy** https://dl.acm.org/doi/10.1145/3658644.3670297 Sven Argo, Tim Güneysu, Corentin Jeudy, Georg Land, Adeline Roux-Langlois, Olivier Sanders
- **Reckle Trees: Updatable Merkle Batch Proofs with Applications** https://dl.acm.org/doi/10.1145/3658644.3670354 Charalampos Papamanthou, Shravan Srinivasan, Nicolas Gailly, Ismael Hishon-Rezaizadeh, Andrus Salumets, Stjepan Golemac
- **Provable Security for PKI Schemes** https://dl.acm.org/doi/10.1145/3658644.3670374 Sara Wrótniak, Hemi Leibowitz, Ewa Syta, Amir Herzberg
- **Fast Two-party Threshold ECDSA with Proactive Security** https://dl.acm.org/doi/10.1145/3658644.3670387 Brian Koziel, S. Dov Gordon, Craig Gentry
- **Batch Range Proof: How to Make Threshold ECDSA More Efficient** https://dl.acm.org/doi/10.1145/3658644.3670287 Guofeng Tang, Shuai Han, Li Lin, Changzheng Wei, Ying Yan
- **RSA-Based Dynamic Accumulator without Hashing into Primes** https://dl.acm.org/doi/10.1145/3658644.3690199 Victor Youdom Kemmoe, Anna Lysyanskaya
- **Non-interactive VSS using Class Groups and Application to DKG** https://dl.acm.org/doi/10.1145/3658644.3670312 Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Hamza Saleem, Sri Aravinda Krishnan Thyagarajan
- **zkPi: Proving Lean Theorems in Zero-Knowledge** https://dl.acm.org/doi/10.1145/3658644.3670322 Evan Laufer, Alex Ozdemir, Dan Boneh
- **Zero-Knowledge Proofs of Training for Deep Neural Networks** https://dl.acm.org/doi/10.1145/3658644.3670316 Kasra Abbaszadeh, Christodoulos Pappas, Jonathan Katz, Dimitrios Papadopoulos