In Cooperation With
Amortized Locally Decodable Codes for Insertions and Deletions
Justin Zhang, Jeremiah Blocki
Powerful Primitives in the Bounded Quantum Storage Model
Mohammed Barhoush, Louis Salvail
Leakage-Resilience of Shamir's Secret Sharing: Identifying Secure Evaluation Places
Jihun Hwang, Hemanta K. Maji, Hai H. Nguyen, Xiuyu Ye
Time-Space Tradeoffs of Truncation with Preprocessing
Krzysztof Pietrzak, Pengxiang Wang
MetaDORAM: Info-Theoretic Distributed ORAM with Less Communication
Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky
Linear-Time Secure Merge in O(log log n) Rounds
Paul Bunn, Mark Blunk, Samuel Dittmer, Steve Lu, Rafail Ostrovsky
On the Definition of Malicious Private Information Retrieval
Bar Alon, Amos Beimel
Revocable Encryption, Programs, and More: The Case of Multi-Copy Security
Prabhanjan Ananth, Saachi Mutreja, Alexander Poremba
Multi-Source Randomness Extraction and Generation in the Random-Oracle Model
Sandro Coretti, Pooya Farshim, Patrick Harasser, Karl Southern
New results in Share Conversion, with applications to evolving access structures
Tamar Ben David, Varun Narayanan, Olga Nissenbaum, Anat Paskin-Cherniavsky
Key-Agreement with Perfect Completeness from Random Oracles
Noam Mazor