TCC B

36 papers

YearTitle / Authors
2010A Domain Extender for the Ideal Cipher.
Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin
2010A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch.
Ueli M. Maurer, Stefano Tessaro
2010A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems.
Ronald Cramer, Dennis Hofheinz, Eike Kiltz
2010Almost Optimal Bounds for Direct Product Threshold Theorem.
Charanjit S. Jutla
2010An Efficient Parallel Repetition Theorem.
Johan Håstad, Rafael Pass, Douglas Wikström, Krzysztof Pietrzak
2010Bounds on the Sample Complexity for Private Learning and Private Data Release.
Amos Beimel, Shiva Prasad Kasiviswanathan, Kobbi Nissim
2010Composition of Zero-Knowledge Proofs with Efficient Provers.
Eleanor Birrell, Salil P. Vadhan
2010Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs.
Benoît Libert, Moti Yung
2010Delayed-Key Message Authentication for Streams.
Marc Fischlin, Anja Lehmann
2010Efficiency Limitations for Σ-Protocols for Group Homomorphisms.
Endre Bangerter, Jan Camenisch, Stephan Krenn
2010Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge.
Rafail Ostrovsky, Omkant Pandey, Ivan Visconti
2010Efficient Rational Secret Sharing in Standard Communication Networks.
Georg Fuchsbauer, Jonathan Katz, David Naccache
2010Efficient, Robust and Constant-Round Distributed RSA Key Generation.
Ivan Damgård, Gert Læssøe Mikkelsen
2010Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing Model.
Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam
2010Founding Cryptography on Tamper-Proof Hardware Tokens.
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia
2010From Passive to Covert Security at Low Cost.
Ivan Damgård, Martin Geisler, Jesper Buus Nielsen
2010Ideal Hierarchical Secret Sharing Schemes.
Oriol Farràs, Carles Padró
2010Leakage-Resilient Signatures.
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy N. Rothblum
2010New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
Allison B. Lewko, Brent Waters
2010Obfuscation of Hyperplane Membership.
Ran Canetti, Guy N. Rothblum, Mayank Varia
2010On Complete Primitives for Fairness.
S. Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostrovsky, Amit Sahai
2010On Related-Secret Pseudorandomness.
David Goldenberg, Moses D. Liskov
2010On Symmetric Encryption and Point Obfuscation.
Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs
2010On the Necessary and Sufficient Assumptions for UC Computation.
Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi
2010Parallel Repetition Theorems for Interactive Arguments.
Kai-Min Chung, Feng-Hao Liu
2010Privacy-Enhancing Cryptography: From Theory into Practice.
Jan Camenisch
2010Private Coins versus Public Coins in Zero-Knowledge Proof Systems.
Rafael Pass, Muthuramakrishnan Venkitasubramaniam
2010Public-Key Cryptographic Primitives Provably as Secure as Subset Sum.
Vadim Lyubashevsky, Adriana Palacio, Gil Segev
2010Public-Key Encryption Schemes with Auxiliary Inputs.
Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kalai, Chris Peikert, Vinod Vaikuntanathan
2010Rationality in the Full-Information Model.
Ronen Gradwohl
2010Robust Encryption.
Michel Abdalla, Mihir Bellare, Gregory Neven
2010Secure Computation and Its Diverse Applications.
Yuval Ishai
2010Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings
Daniele Micciancio
2010Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems.
Rikke Bendlin, Ivan Damgård
2010Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens.
Vladimir Kolesnikov
2010Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs.
Yevgeniy Vahlis