| 2022 | 3rd Conference on Information-Theoretic Cryptography, ITC 2022, Cambridge, MA, USA, July 5-7, 2022 Dana Dachman-Soled |
| 2022 | A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff. Lior Rotem, Gil Segev |
| 2022 | A Note on the Complexity of Private Simultaneous Messages with Many Parties. Marshall Ball, Tim Randolph |
| 2022 | From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-Theoretic. Varun Madathil, Chris Orsini, Alessandra Scafuro, Daniele Venturi |
| 2022 | Front Matter, Table of Contents, Preface, Conference Organization. |
| 2022 | Information-Theoretic Distributed Point Functions. Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov |
| 2022 | Maliciously Circuit-Private FHE from Information-Theoretic Principles. Nico Döttling, Jesko Dujmovic |
| 2022 | Multi-Server PIR with Full Error Detection and Limited Error Correction. Reo Eriguchi, Kaoru Kurosawa, Koji Nuida |
| 2022 | Multiparty Computation with Covert Security and Public Verifiability. Peter Scholl, Mark Simkin, Luisa Siniscalchi |
| 2022 | On Seedless PRNGs and Premature Next. Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, Stefano Tessaro |
| 2022 | On the Distributed Discrete Logarithm Problem with Preprocessing. Pavel Hubácek, L'ubica Jancová, Veronika Králová |
| 2022 | Property-Preserving Hash Functions and Combinatorial Group Testing. Kazuhiko Minematsu |
| 2022 | Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and More. Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss |
| 2022 | Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC. Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, Daniel Wichs |
| 2022 | Revisiting Collision and Local Opening Analysis of ABR Hash. Chandranan Dhar, Yevgeniy Dodis, Mridul Nandi |
| 2022 | Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups. Lior Rotem |
| 2022 | Static vs. Adaptive Security in Perfect MPC: A Separation and the Adaptive Security of BGW. Gilad Asharov, Ran Cohen, Oren Shochat |
| 2022 | Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its Consequences. Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang, Xiuyu Ye, Albert Yu |
| 2022 | Universally Composable Almost-Everywhere Secure Computation. Nishanth Chandran, Pouyan Forghani, Juan A. Garay, Rafail Ostrovsky, Rutvik Patel, Vassilis Zikas |