default search action
11. TCC 2014: San Diego, CA, USA
- Yehuda Lindell:
Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings. Lecture Notes in Computer Science 8349, Springer 2014, ISBN 978-3-642-54241-1
Obfuscation
- Zvika Brakerski, Guy N. Rothblum:
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding. 1-25 - Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai:
Obfuscation for Evasive Functions. 26-51 - Elette Boyle, Kai-Min Chung, Rafael Pass:
On Extractability Obfuscation. 52-73
Applications of Obfuscation
- Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova:
Two-Round Secure MPC from Indistinguishability Obfuscation. 74-94 - Takahiro Matsuda, Goichiro Hanaoka:
Chosen Ciphertext Security via Point Obfuscation. 95-120
Zero Knowledge
- Yuval Ishai, Mor Weiss:
Probabilistically Checkable Proofs of Proximity with Zero-Knowledge. 121-145 - Omkant Pandey:
Achieving Constant Round Leakage-Resilient Zero-Knowledge. 146-166 - Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti:
Statistical Concurrent Non-malleable Zero Knowledge. 167-191 - Kai-Min Chung, Rafail Ostrovsky, Rafael Pass, Muthuramakrishnan Venkitasubramaniam, Ivan Visconti:
4-Round Resettably-Sound Zero Knowledge. 192-216
Black-Box Separations
- Dana Dachman-Soled, Mohammad Mahmoody, Tal Malkin:
Can Optimally-Fair Coin Tossing Be Based on One-Way Functions? 217-239 - Mohammad Mahmoody, Hemanta K. Maji, Manoj Prabhakaran:
On the Power of Public-Key Encryption in Secure Computation. 240-264 - Takahiro Matsuda:
On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations. 265-290
Secure Computation
- Gilad Asharov:
Towards Characterizing Complete Fairness in Secure Two-Party Computation. 291-316 - Amos Beimel, Yuval Ishai, Ranjit Kumaresan, Eyal Kushilevitz:
On the Cryptographic Complexity of the Worst Functions. 317-342 - Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto:
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol. 343-367 - Carmit Hazay, Arpita Patra:
One-Sided Adaptively Secure Two-Party Computation. 368-393 - Amos Beimel, Aner Ben-Efraim, Carles Padró, Ilya Tyomkin:
Multi-linear Secret-Sharing Schemes. 394-418 - Martin Hirt, Ueli Maurer, Pavel Raykov:
Broadcast Amplification. 419-439
Coding and Cryptographic Applications
- Mahdi Cheraghchi, Venkatesan Guruswami:
Non-malleable Coding against Bit-Wise and Split-State Tampering. 440-464 - Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi:
Continuous Non-malleable Codes. 465-488 - Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky:
Locally Updatable and Locally Decodable Codes. 489-514
Leakage
- Alexandra Berkoff, Feng-Hao Liu:
Leakage Resilient Fully Homomorphic Encryption. 515-539 - Dana Dachman-Soled, Yael Tauman Kalai:
Securing Circuits and Protocols against 1/poly(k) Tampering Rate. 540-565 - Dimitar Jetchev, Krzysztof Pietrzak:
How to Fake Auxiliary Input. 566-590
Encryption
- Dennis Hofheinz, Andy Rupp:
Standard versus Selective Opening Security: Separation and Equivalence Results. 591-615 - Hoeteck Wee:
Dual System Encryption via Predicate Encodings. 616-637
Hardware-Aided Secure Protocols
- Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou:
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. 638-662 - Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, Alon Rosen:
Lower Bounds in the Hardware Token Model. 663-687
Encryption and Signatures
- Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi:
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures. 688-712 - Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya:
On the Impossibility of Structure-Preserving Deterministic Primitives. 713-738
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.