Login / Signup
TCC (2)
2015
2018
2023
2015
2023
Keyphrases
Publications
2023
Ananya Appan
,
Ashish Choudhury
Network Agnostic MPC with Statistical Security.
TCC (2)
(2023)
Yevgeniy Dodis
,
Shai Halevi
,
Daniel Wichs
Security with Functional Re-encryption from CPA.
TCC (2)
(2023)
Bar Alon
,
Eran Omri
On Secure Computation of Solitary Output Functionalities with and Without Broadcast.
TCC (2)
(2023)
Brett Hemenway Falk
,
Daniel Noble
,
Tal Rabin
Proactive Secret Sharing with Constant Communication.
TCC (2)
(2023)
Amos Beimel
,
Oriol Farràs
,
Or Lasri
Improved Polynomial Secret-Sharing Schemes.
TCC (2)
(2023)
Bar Alon
,
Amos Beimel
,
Eran Omri
Three Party Secure Computation with Friends and Foes.
TCC (2)
(2023)
Surya Mathialagan
Memory Checking for Parallel RAMs.
TCC (2)
(2023)
Mohammad Hajiabadi
,
Mohammad Mahmoody
,
Wei Qi
,
Sara Sarfaraz
Lower Bounds on Assumptions Behind Registration-Based Encryption.
TCC (2)
(2023)
Michele Ciampi
,
Ivan Damgård
,
Divya Ravi
,
Luisa Siniscalchi
,
Yu Xia
,
Sophia Yakoubov
Broadcast-Optimal Four-Round MPC in the Plain Model.
TCC (2)
(2023)
Saikrishna Badrinarayanan
,
Peihan Miao
,
Pratyay Mukherjee
,
Divya Ravi
On the Round Complexity of Fully Secure Solitary MPC with Honest Majority.
TCC (2)
(2023)
Daniel Slamanig
,
Christoph Striecks
Revisiting Updatable Encryption: Controlled Forward Security, Constructions and a Puncturable Perspective.
TCC (2)
(2023)
Shashank Agrawal
,
Shweta Agrawal
,
Manoj Prabhakaran
,
Rajeev Raghunath
,
Jayesh Singla
CASE: A New Frontier in Public-Key Authenticated Encryption.
TCC (2)
(2023)
Yuval Ishai
,
Eyal Kushnir
,
Ron D. Rothblum
Combinatorially Homomorphic Encryption.
TCC (2)
(2023)
Arthur Lazzaretti
,
Charalampos Papamanthou
Near-Optimal Private Information Retrieval with Preprocessing.
TCC (2)
(2023)
Ran Canetti
,
Sebastian Kolby
,
Divya Ravi
,
Eduardo Soria-Vazquez
,
Sophia Yakoubov
Taming Adaptivity in YOSO Protocols: The Modular Way.
TCC (2)
(2023)
volume 14370, 2023
Theory of Cryptography - 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part II
TCC (2)
14370 (2023)
2022
George Lu
,
Brent Waters
How to Sample a Discrete Gaussian (and more) from a Random Oracle.
TCC (2)
(2022)
Benny Applebaum
,
Eliran Kachlon
,
Arpita Patra
Round-Optimal Honest-Majority MPC in Minicrypt and with Everlasting Security - (Extended Abstract).
TCC (2)
(2022)
Nathan Geier
A Tight Computational Indistinguishability Bound for Product Distributions.
TCC (2)
(2022)
Dario Catalano
,
Dario Fiore
,
Rosario Gennaro
,
Emanuele Giunta
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups.
TCC (2)
(2022)
Moni Naor
,
Noa Oved
Bet-or-Pass: Adversarially Robust Bloom Filters.
TCC (2)
(2022)
Megumi Ando
,
Miranda Christ
,
Anna Lysyanskaya
,
Tal Malkin
Poly Onions: Achieving Anonymity in the Presence of Churn.
TCC (2)
(2022)
Bar Alon
,
Olga Nissenbaum
,
Eran Omri
,
Anat Paskin-Cherniavsky
,
Arpita Patra
On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness.
TCC (2)
(2022)
Kaartik Bhushan
,
Ankit Kumar Misra
,
Varun Narayanan
,
Manoj Prabhakaran
Secure Non-interactive Reducibility is Decidable.
TCC (2)
(2022)
Yevgeniy Dodis
,
Daniel Jost
,
Harish Karthikeyan
Forward-Secure Encryption with Fast Forwarding.
TCC (2)
(2022)
Venkata Koppula
,
Brent Waters
,
Mark Zhandry
Adaptive Multiparty NIKE.
TCC (2)
(2022)
Anasuya Acharya
,
Carmit Hazay
,
Vladimir Kolesnikov
,
Manoj Prabhakaran
SCALES - MPC with Small Clients and Larger Ephemeral Servers.
TCC (2)
(2022)
Cody Freitag
,
Rafael Pass
,
Naomi Sirkin
Parallelizable Delegation from LWE.
TCC (2)
(2022)
Seung Geol Choi
,
Dana Dachman-Soled
,
S. Dov Gordon
,
Linsheng Liu
,
Arkady Yerukhimovich
Secure Sampling with Sublinear Communication.
TCC (2)
(2022)
Nir Bitansky
,
Arka Rai Choudhuri
,
Justin Holmgren
,
Chethan Kamath
,
Alex Lombardi
,
Omer Paneth
,
Ron D. Rothblum
PPAD is as Hard as LWE and Iterated Squaring.
TCC (2)
(2022)
Thomas Agrikola
,
Geoffroy Couteau
,
Sven Maier
Anonymous Whistleblowing over Authenticated Channels.
TCC (2)
(2022)
Elette Boyle
,
Geoffroy Couteau
,
Pierre Meyer
Sublinear Secure Computation from New Assumptions.
TCC (2)
(2022)
Pedro Branco
,
Nico Döttling
,
Jesko Dujmovic
Rate-1 Incompressible Encryption from Standard Assumptions.
TCC (2)
(2022)
Michele Ciampi
,
Emmanuela Orsini
,
Luisa Siniscalchi
Four-Round Black-Box Non-malleable Schemes from One-Way Permutations.
TCC (2)
(2022)
Andrej Bogdanov
,
Miguel Cueto Noval
,
Charlotte Hoffmann
,
Alon Rosen
Public-Key Encryption from Homogeneous CLWE.
TCC (2)
(2022)
Saikrishna Badrinarayanan
,
Sikhar Patranabis
,
Pratik Sarkar
Statistical Security in Two-Party Computation Revisited.
TCC (2)
(2022)
Nicholas Brandt
,
Dennis Hofheinz
,
Julia Kastner
,
Akin Ünal
The Price of Verifiability: Lower Bounds for Verifiable Random Functions.
TCC (2)
(2022)
Yuval Ishai
,
Dakshita Khurana
,
Amit Sahai
,
Akshayaram Srinivasan
Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT.
TCC (2)
(2022)
Adi Akavia
,
Craig Gentry
,
Shai Halevi
,
Margarita Vald
Achievable CCA2 Relaxation for Homomorphic Encryption.
TCC (2)
(2022)
Alexander Bienstock
,
Yevgeniy Dodis
,
Sanjam Garg
,
Garrison Grogan
,
Mohammad Hajiabadi
,
Paul Rösler
On the Worst-Case Inefficiency of CGKA.
TCC (2)
(2022)
Ian McQuoid
,
Mike Rosulek
,
Jiayu Xu
How to Obfuscate MPC Inputs.
TCC (2)
(2022)
Yuval Ishai
,
Arpita Patra
,
Sikhar Patranabis
,
Divya Ravi
,
Akshayaram Srinivasan
Fully-Secure MPC with Minimal Trust.
TCC (2)
(2022)
Hamidreza Amini Khorasgani
,
Hemanta K. Maji
,
Hai H. Nguyen
Secure Non-interactive Simulation from Arbitrary Joint Distributions.
TCC (2)
(2022)
volume 13748, 2022
Theory of Cryptography - 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part II
TCC (2)
13748 (2022)
2021
Arka Rai Choudhuri
,
Michele Ciampi
,
Vipul Goyal
,
Abhishek Jain
,
Rafail Ostrovsky
Oblivious Transfer from Trapdoor Permutations in Minimal Rounds.
TCC (2)
(2021)
Salil P. Vadhan
,
Tianhao Wang
Concurrent Composition of Differential Privacy.
TCC (2)
(2021)
Noam Mazor
,
Jiapeng Zhang
Simple Constructions from (Almost) Regular One-Way Functions.
TCC (2)
(2021)
Gianluca Brian
,
Antonio Faonio
,
Daniele Venturi
Continuously Non-malleable Secret Sharing: Joint Tampering, Plain Model and Capacity.
TCC (2)
(2021)
Hoeteck Wee
ABE for DFA from LWE Against Bounded Collusions, Revisited.
TCC (2)
(2021)
volume 13043, 2021
Theory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part II
TCC (2)
13043 (2021)