TCC B

35 papers

YearTitle / Authors
2008A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval.
Iftach Haitner, Jonathan J. Hoch, Gil Segev
2008An Equivalence Between Zero Knowledge and Commitments.
Shien Jin Ong, Salil P. Vadhan
2008Asymptotically Efficient Lattice-Based Digital Signatures.
Vadim Lyubashevsky, Daniele Micciancio
2008Basing Weak Public-Key Cryptography on Strong One-Way Functions.
Eli Biham, Yaron J. Goren, Yuval Ishai
2008Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One.
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
2008Bridging Game Theory and Cryptography: Recent Results and Future Directions.
Jonathan Katz
2008Concurrent Non-malleable Commitments from Any One-Way Function.
Huijia Lin, Rafael Pass, Muthuramakrishnan Venkitasubramaniam
2008Cryptography and Game Theory: Designing Protocols for Exchanging Information.
Gillat Kol, Moni Naor
2008Degradation and Amplification of Computational Hardness.
Shai Halevi, Tal Rabin
2008Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries.
Carmit Hazay, Yehuda Lindell
2008Equivocal Blind Signatures and Adaptive UC-Security.
Aggelos Kiayias, Hong-Sheng Zhou
2008Fast Private Norm Estimation and Heavy Hitters.
Joe Kilian, André Madeira, Martin J. Strauss, Xuan Zheng
2008Faster and Shorter Password-Authenticated Key Exchange.
Rosario Gennaro
2008General Properties of Quantum Zero-Knowledge Proofs.
Hirotada Kobayashi
2008How to Achieve Perfect Simulation and A Complete Problem for Non-interactive Perfect Zero-Knowledge.
Lior Malka
2008Incrementally Verifiable Computation or Proofs of Knowledge Imply Time/Space Efficiency.
Paul Valiant
2008Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model.
André Chailloux, Dragos Florin Ciocan, Iordanis Kerenidis, Salil P. Vadhan
2008Lower Bounds on Implementing Robust and Resilient Mediators.
Ittai Abraham, Danny Dolev, Joseph Y. Halpern
2008MPC vs. SFE: Perfect Security in a Unified Corruption Model.
Zuzana Beerliová-Trubíniová, Matthias Fitzi, Martin Hirt, Ueli M. Maurer, Vassilis Zikas
2008Matroids Can Be Far from Ideal Secret Sharing.
Amos Beimel, Noam Livne, Carles Padró
2008Multi-property Preserving Combiners for Hash Functions.
Marc Fischlin, Anja Lehmann
2008OT-Combiners via Secure Computation.
Danny Harnik, Yuval Ishai, Eyal Kushilevitz, Jesper Buus Nielsen
2008On Constant-Round Concurrent Zero-Knowledge.
Rafael Pass, Muthuramakrishnan Venkitasubramaniam
2008On Seed-Incompressible Functions.
Shai Halevi, Steven A. Myers, Charles Rackoff
2008P-signatures and Noninteractive Anonymous Credentials.
Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya
2008Perfectly-Secure MPC with Linear Communication Complexity.
Zuzana Beerliová-Trubíniová, Martin Hirt
2008Randomness Extraction Via
Serge Fehr, Christian Schaffner
2008Saving Private Randomness in One-Way Functions and Pseudorandom Generators.
Nenad Dedic, Danny Harnik, Leonid Reyzin
2008Semi-honest to Malicious Oblivious Transfer - The Black-Box Way.
Iftach Haitner
2008The Layered Games Framework for Specifications and Analysis of Security Protocols.
Amir Herzberg, Igal Yoffe
2008The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization.
Daniele Micciancio, Scott Yilek
2008Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008.
Ran Canetti
2008Universally Composable Multi-party Computation with an Unreliable Common Reference String.
Vipul Goyal, Jonathan Katz
2008Verifiably Secure Devices.
Sergei Izmalkov, Matt Lepinski, Silvio Micali
2008Which Languages Have 4-Round Zero-Knowledge Proofs?
Jonathan Katz