TCC B

36 papers

YearTitle / Authors
2009Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer.
Yehuda Lindell, Hila Zarosim
2009An Optimally Fair Coin Toss.
Tal Moran, Moni Naor, Gil Segev
2009Authenticated Adversarial Routing.
Yair Amir, Paul Bunn, Rafail Ostrovsky
2009Black-Box Constructions of Two-Party Protocols from One-Way Functions.
Rafael Pass, Hoeteck Wee
2009Chosen-Ciphertext Security via Correlated Products.
Alon Rosen, Gil Segev
2009Complete Fairness in Multi-party Computation without an Honest Majority.
S. Dov Gordon, Jonathan Katz
2009Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation.
Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek
2009Composability and On-Line Deniability of Authentication.
Yevgeniy Dodis, Jonathan Katz, Adam D. Smith, Shabsi Walfish
2009Composing Quantum Protocols in a Classical Environment.
Serge Fehr, Christian Schaffner
2009Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection.
Stanislaw Jarecki, Xiaomin Liu
2009Fairness with an Honest Minority and a Rational Majority.
Shien Jin Ong, David C. Parkes, Alon Rosen, Salil P. Vadhan
2009Goldreich's One-Way Function Candidate and Myopic Backtracking Algorithms.
James Cook, Omid Etesami, Rachel Miller, Luca Trevisan
2009Hierarchical Identity Based Encryption with Polynomially Many Levels.
Craig Gentry, Shai Halevi
2009How Efficient Can Memory Checking Be?.
Cynthia Dwork, Moni Naor, Guy N. Rothblum, Vinod Vaikuntanathan
2009LEGO for Two-Party Secure Computation.
Jesper Buus Nielsen, Claudio Orlandi
2009Non-malleable Obfuscation.
Ran Canetti, Mayank Varia
2009Oblivious Transfer from Weak Noisy Channels.
Jürg Wullschleger
2009On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols.
Iftach Haitner, Alon Rosen, Ronen Shaltiel
2009On the (Im)Possibility of Key Dependent Encryption.
Iftach Haitner, Thomas Holenstein
2009Predicate Privacy in Encryption Systems.
Emily Shen, Elaine Shi, Brent Waters
2009Proofs of Retrievability via Hardness Amplification.
Yevgeniy Dodis, Salil P. Vadhan, Daniel Wichs
2009Purely Rational Secret Sharing (Extended Abstract).
Silvio Micali, Abhi Shelat
2009Realistic Failures in Secure Multi-party Computation.
Vassilis Zikas, Sarah Hauser, Ueli M. Maurer
2009Secret Sharing and Non-Shannon Information Inequalities.
Amos Beimel, Ilan Orlov
2009Secure Arithmetic Computation with No Honest Majority.
Yuval Ishai, Manoj Prabhakaran, Amit Sahai
2009Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security.
Robin Künzler, Jörn Müller-Quade, Dominik Raub
2009Security Amplification for InteractiveCryptographic Primitives.
Yevgeniy Dodis, Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets
2009Simple, Black-Box Constructions of Adaptively Secure Protocols.
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee
2009Simulation-Based Concurrent Non-malleable Commitments and Decommitments.
Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
2009Simultaneous Hardcore Bits and Cryptography against Memory Attacks.
Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan
2009Some Recent Progress in Lattice-Based Cryptography.
Chris Peikert
2009The Differential Privacy Frontier (Extended Abstract).
Cynthia Dwork
2009Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings
Omer Reingold
2009Towards a Theory of Extractable Functions.
Ran Canetti, Ronny Ramzi Dakdouk
2009Universally Composable Multiparty Computation with Partially Isolated Parties.
Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs
2009Weak Verifiable Random Functions.
Zvika Brakerski, Shafi Goldwasser, Guy N. Rothblum, Vinod Vaikuntanathan