Weak Locking Capacity of Quantum Channels Can be Much Larger Than Private Capacity Andreas Winter OriginalPaper 14 September 2015 Pages: 1 - 21
Dynamic Proofs of Retrievability Via Oblivious RAM David CashAlptekin KüpçüDaniel Wichs OriginalPaper 22 September 2015 Pages: 22 - 57
A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation Gilad AsharovYehuda Lindell OriginalPaper 28 September 2015 Pages: 58 - 151
Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier Ivan DamgårdSebastian FaustDaniele Venturi OriginalPaper 30 September 2015 Pages: 152 - 190
Non-malleable Coding Against Bit-Wise and Split-State Tampering Mahdi CheraghchiVenkatesan Guruswami OriginalPaper 06 October 2015 Pages: 191 - 241
An Algebraic Framework for Diffie–Hellman Assumptions Alex EscalaGottfried HeroldJorge Villar OriginalPaper 22 October 2015 Pages: 242 - 288
Obfuscating Conjunctions Zvika BrakerskiGuy N. Rothblum OriginalPaper 23 November 2015 Pages: 289 - 320
Efficient One-Sided Adaptively Secure Computation Carmit HazayArpita Patra OriginalPaper 30 December 2015 Pages: 321 - 371