TCC B

33 papers

YearTitle / Authors
2005A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes.
María Isabel González Vasco, Consuelo Martínez, Rainer Steinwandt, Jorge Luis Villar
2005A Universally Composable Secure Channel Based on the KEM-DEM Framework.
Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto
2005Adaptive Security of Symbolic Encryption.
Daniele Micciancio, Saurabh Panjwani
2005Adaptively-Secure, Non-interactive Public-Key Encryption.
Ran Canetti, Shai Halevi, Jonathan Katz
2005Characterizing Ideal Weighted Threshold Secret Sharing.
Amos Beimel, Tamir Tassa, Enav Weinreb
2005Chosen-Ciphertext Security of Multiple Encryption.
Yevgeniy Dodis, Jonathan Katz
2005Comparing Two Notions of Simulatability.
Dennis Hofheinz, Dominique Unruh
2005Cryptography in Subgroups of Z
Jens Groth
2005Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs.
Moni Naor, Asaf Nussboim, Eran Tromer
2005Entropic Security and the Encryption of High Entropy Messages.
Yevgeniy Dodis, Adam D. Smith
2005Error Correction in the Bounded Storage Model.
Yan Zong Ding
2005Evaluating 2-DNF Formulas on Ciphertexts.
Dan Boneh, Eu-Jin Goh, Kobbi Nissim
2005Fair-Zero Knowledge.
Matt Lepinski, Silvio Micali, Abhi Shelat
2005Further Simplifications in Proactive RSA Signatures.
Stanislaw Jarecki, Nitesh Saxena
2005Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs.
Jonathan Katz, Yehuda Lindell
2005Hardness Amplification of Weakly Verifiable Puzzles.
Ran Canetti, Shai Halevi, Michael Steiner
2005How to Securely Outsource Cryptographic Computations.
Susan Hohenberger, Anna Lysyanskaya
2005Keyword Search and Oblivious Pseudorandom Functions.
Michael J. Freedman, Yuval Ishai, Benny Pinkas, Omer Reingold
2005On Hardness Amplification of One-Way Functions.
Henry C. Lin, Luca Trevisan, Hoeteck Wee
2005On the Relationships Between Notions of Simulation-Based Security.
Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan
2005Optimal Error Correction Against Computationally Bounded Noise.
Silvio Micali, Chris Peikert, Madhu Sudan, David A. Wilson
2005Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem.
Shafi Goldwasser, Dmitriy Kharchenko
2005Public-Key Steganography with Active Attacks.
Michael Backes, Christian Cachin
2005Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation.
Manoj Prabhakaran, Amit Sahai
2005Secure Computation of the Mean and Related Statistics.
Eike Kiltz, Gregor Leander, John Malone-Lee
2005Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation.
Ronald Cramer, Ivan Damgård, Yuval Ishai
2005Sufficient Conditions for Collision-Resistant Hashing.
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky
2005The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives.
Minh-Huyen Nguyen
2005The Universal Composable Security of Quantum Key Distribution.
Michael Ben-Or, Michal Horodecki, Debbie W. Leung, Dominic Mayers, Jonathan Oppenheim
2005Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings
Joe Kilian
2005Toward Privacy in Public Databases.
Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam D. Smith, Hoeteck Wee
2005Universally Composable Privacy Amplification Against Quantum Adversaries.
Renato Renner, Robert König
2005Upper and Lower Bounds on Black-Box Steganography.
Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell