Login / Signup
TCC
2004
2008
2010
2014
2004
2014
Keyphrases
Publications
2014
Sebastian Faust
,
Pratyay Mukherjee
,
Jesper Buus Nielsen
,
Daniele Venturi
Continuous Non-malleable Codes.
TCC
(2014)
Shashank Agrawal
,
Prabhanjan Ananth
,
Vipul Goyal
,
Manoj Prabhakaran
,
Alon Rosen
Lower Bounds in the Hardware Token Model.
TCC
(2014)
Masayuki Abe
,
Jens Groth
,
Miyako Ohkubo
,
Mehdi Tibouchi
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures.
TCC
(2014)
Dana Dachman-Soled
,
Yael Tauman Kalai
Securing Circuits and Protocols against 1/poly(k) Tampering Rate.
TCC
(2014)
Claudio Orlandi
,
Rafail Ostrovsky
,
Vanishree Rao
,
Amit Sahai
,
Ivan Visconti
Statistical Concurrent Non-malleable Zero Knowledge.
TCC
(2014)
Elette Boyle
,
Kai-Min Chung
,
Rafael Pass
On Extractability Obfuscation.
TCC
(2014)
Kai-Min Chung
,
Rafail Ostrovsky
,
Rafael Pass
,
Muthuramakrishnan Venkitasubramaniam
,
Ivan Visconti
4-Round Resettably-Sound Zero Knowledge.
TCC
(2014)
Carmit Hazay
,
Arpita Patra
One-Sided Adaptively Secure Two-Party Computation.
TCC
(2014)
Hoeteck Wee
Dual System Encryption via Predicate Encodings.
TCC
(2014)
Gilad Asharov
Towards Characterizing Complete Fairness in Secure Two-Party Computation.
TCC
(2014)
Alexandra Berkoff
,
Feng-Hao Liu
Leakage Resilient Fully Homomorphic Encryption.
TCC
(2014)
Mohammad Mahmoody
,
Hemanta K. Maji
,
Manoj Prabhakaran
On the Power of Public-Key Encryption in Secure Computation.
TCC
(2014)
Seung Geol Choi
,
Jonathan Katz
,
Dominique Schröder
,
Arkady Yerukhimovich
,
Hong-Sheng Zhou
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
TCC
(2014)
Mahdi Cheraghchi
,
Venkatesan Guruswami
Non-malleable Coding against Bit-Wise and Split-State Tampering.
TCC
(2014)
Boaz Barak
,
Nir Bitansky
,
Ran Canetti
,
Yael Tauman Kalai
,
Omer Paneth
,
Amit Sahai
Obfuscation for Evasive Functions.
TCC
(2014)
Dana Dachman-Soled
,
Mohammad Mahmoody
,
Tal Malkin
Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?
TCC
(2014)
Martin Hirt
,
Ueli Maurer
,
Pavel Raykov
Broadcast Amplification.
TCC
(2014)
Yuval Ishai
,
Mor Weiss
Probabilistically Checkable Proofs of Proximity with Zero-Knowledge.
TCC
(2014)
Amos Beimel
,
Yuval Ishai
,
Ranjit Kumaresan
,
Eyal Kushilevitz
On the Cryptographic Complexity of the Worst Functions.
TCC
(2014)
Masayuki Abe
,
Jan Camenisch
,
Rafael Dowsley
,
Maria Dubovitskaya
On the Impossibility of Structure-Preserving Deterministic Primitives.
TCC
(2014)
Sanjam Garg
,
Craig Gentry
,
Shai Halevi
,
Mariana Raykova
Two-Round Secure MPC from Indistinguishability Obfuscation.
TCC
(2014)
Omkant Pandey
Achieving Constant Round Leakage-Resilient Zero-Knowledge.
TCC
(2014)
Dimitar Jetchev
,
Krzysztof Pietrzak
How to Fake Auxiliary Input.
TCC
(2014)
Susumu Kiyoshima
,
Yoshifumi Manabe
,
Tatsuaki Okamoto
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol.
TCC
(2014)
Takahiro Matsuda
On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations.
TCC
(2014)
Amos Beimel
,
Aner Ben-Efraim
,
Carles Padró
,
Ilya Tyomkin
Multi-linear Secret-Sharing Schemes.
TCC
(2014)
Takahiro Matsuda
,
Goichiro Hanaoka
Chosen Ciphertext Security via Point Obfuscation.
TCC
(2014)
Nishanth Chandran
,
Bhavana Kanukurthi
,
Rafail Ostrovsky
Locally Updatable and Locally Decodable Codes.
TCC
(2014)
Zvika Brakerski
,
Guy N. Rothblum
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding.
TCC
(2014)
Dennis Hofheinz
,
Andy Rupp
Standard versus Selective Opening Security: Separation and Equivalence Results.
TCC
(2014)
volume 8349, 2014
Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings
TCC
8349 (2014)
2013
Mohammad Mahmoody
,
David Xiao
Languages with Efficient Zero-Knowledge PCPs are in SZK.
TCC
(2013)
Dario Catalano
,
Dario Fiore
,
Rosario Gennaro
,
Konstantinos Vamvourellis
Algebraic (Trapdoor) One-Way Functions and Their Applications.
TCC
(2013)
Serge Fehr
,
Jonathan Katz
,
Fang Song
,
Hong-Sheng Zhou
,
Vassilis Zikas
Feasibility and Completeness of Cryptographic Tasks in the Quantum World.
TCC
(2013)
Rafael Pass
Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments.
TCC
(2013)
Xavier Boyen
Attribute-Based Functional Encryption on Lattices.
TCC
(2013)
Melissa Chase
,
Markulf Kohlweiss
,
Anna Lysyanskaya
,
Sarah Meiklejohn
Succinct Malleable NIZKs and an Application to Compact Shuffles.
TCC
(2013)
Eleanor Birrell
,
Kai-Min Chung
,
Rafael Pass
,
Sidharth Telang
Randomness-Dependent Message Security.
TCC
(2013)
Jonathan Katz
,
Ueli Maurer
,
Björn Tackmann
,
Vassilis Zikas
Universally Composable Synchronous Computation.
TCC
(2013)
Shiva Prasad Kasiviswanathan
,
Kobbi Nissim
,
Sofya Raskhodnikova
,
Adam D. Smith
Analyzing Graphs with Node Differential Privacy.
TCC
(2013)
Benny Applebaum
Cryptographic Hardness of Random Local Functions-Survey.
TCC
(2013)
Ran Canetti
,
Huijia Lin
,
Omer Paneth
Public-Coin Concurrent Zero-Knowledge in the Global Hash Model.
TCC
(2013)
Yuval Ishai
,
Eyal Kushilevitz
,
Sigurd Meldgaard
,
Claudio Orlandi
,
Anat Paskin-Cherniavsky
On the Power of Correlated Randomness in Secure Computation.
TCC
(2013)
Steve Lu
,
Rafail Ostrovsky
Distributed Oblivious RAM for Secure Two-Party Computation.
TCC
(2013)
Yevgeniy Dodis
,
Yu Yu
Overcoming Weak Expectations.
TCC
(2013)
Prabhanjan Ananth
,
Raghav Bhaskar
,
Vipul Goyal
,
Vanishree Rao
On the (In)security of Fischlin's Paradigm.
TCC
(2013)
Ivan Damgård
,
Sarah Zakarias
Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing.
TCC
(2013)
Steven A. Myers
,
Mona Sergi
,
Abhi Shelat
Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead.
TCC
(2013)
Benny Applebaum
Garbling XOR Gates "For Free" in the Standard Model.
TCC
(2013)
volume 7785, 2013
Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings
TCC
7785 (2013)