TCC B

32 papers

YearTitle / Authors
2007(Password) Authenticated Key Establishment: From 2-Party to Group.
Michel Abdalla, Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt
2007Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions.
Carmit Hazay, Jonathan Katz, Chiu-Yuen Koo, Yehuda Lindell
2007Conjunctive, Subset, and Range Queries on Encrypted Data.
Dan Boneh, Brent Waters
2007Designated Confirmer Signatures Revisited.
Douglas Wikström
2007Does Privacy Require True Randomness?
Carl Bosley, Yevgeniy Dodis
2007Evaluating Branching Programs on Encrypted Data.
Yuval Ishai, Anat Paskin
2007From Weak to Strong Watermarking.
Nicholas Hopper, David Molnar, David A. Wagner
2007How to Shuffle in Public.
Ben Adida, Douglas Wikström
2007Intrusion-Resilient Key Exchange in the Bounded Retrieval Model.
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish
2007Long-Term Security and Universal Composability.
Jörn Müller-Quade, Dominique Unruh
2007Lower Bounds for Non-interactive Zero-Knowledge.
Hoeteck Wee
2007Multi-authority Attribute Based Encryption.
Melissa Chase
2007Obfuscation for Cryptographic Purposes.
Dennis Hofheinz, John Malone-Lee, Martijn Stam
2007On Best-Possible Obfuscation.
Shafi Goldwasser, Guy N. Rothblum
2007On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits.
Oded Goldreich
2007On Secret Sharing Schemes, Matroids and Polymatroids.
Jaume Martí-Farré, Carles Padró
2007On the Necessity of Rewinding in Secure Multiparty Computation.
Michael Backes, Jörn Müller-Quade, Dominique Unruh
2007One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments.
Hoeteck Wee
2007Parallel Repetition of Computationally Sound Protocols Revisited.
Krzysztof Pietrzak, Douglas Wikström
2007Perfect NIZK with Adaptive Soundness.
Masayuki Abe, Serge Fehr
2007Private Approximation of Clustering and Vertex Cover.
Amos Beimel, Renen Hallak, Kobbi Nissim
2007Robuster Combiners for Oblivious Transfer.
Remo Meier, Bartosz Przydatek, Jürg Wullschleger
2007Secure Linear Algebra Using Linearly Recurrent Sequences.
Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew K. Franklin
2007Securely Obfuscating Re-encryption.
Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan
2007Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries.
Yonatan Aumann, Yehuda Lindell
2007Tackling Adaptive Corruptions in Multicast Encryption Protocols.
Saurabh Panjwani
2007Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings
Salil P. Vadhan
2007Towards Optimal and Efficient Perfectly Secure Message Transmission.
Matthias Fitzi, Matthew K. Franklin, Juan A. Garay, Harsha Vardhan Simhadri
2007Towards a Separation of Semantic and CCA Security for Public Key Encryption.
Yael Gertner, Tal Malkin, Steven A. Myers
2007Unifying Classical and Quantum Key Distillation.
Matthias Christandl, Artur Ekert, Michal Horodecki, Pawel Horodecki, Jonathan Oppenheim, Renato Renner
2007Universally Composable Security with Global Setup.
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish
2007Weakly-Private Secret Sharing Schemes.
Amos Beimel, Matthew K. Franklin