TCC B

38 papers

YearTitle / Authors
2011(Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks.
David Xiao
2011A Zero-One Law for Secure Multi-party Computation with Ternary Outputs.
Gunnar Kreitz
2011Achieving Leakage Resilience through Dual System Encryption.
Allison B. Lewko, Yannis Rouselakis, Brent Waters
2011After-the-Fact Leakage in Public-Key Encryption.
Shai Halevi, Huijia Lin
2011Black-Box Circular-Secure Encryption beyond Affine Functions.
Zvika Brakerski, Shafi Goldwasser, Yael Tauman Kalai
2011Bringing People of Different Beliefs Together to Do UC.
Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai
2011Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions.
Daniel Kraschewski, Jörn Müller-Quade
2011Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs.
Huijia Lin, Rafael Pass
2011Concurrent Security and Non-malleability.
Rafael Pass
2011Correlated-Input Secure Hash Functions.
Vipul Goyal, Adam O'Neill, Vanishree Rao
2011Dense Model Theorems and Their Applications.
Luca Trevisan
2011Exploring the Limits of Common Coins Using Frontier Analysis of Protocols.
Hemanta K. Maji, Pichayoot Ouppaphan, Manoj Prabhakaran, Mike Rosulek
2011Functional Encryption: Definitions and Challenges.
Dan Boneh, Amit Sahai, Brent Waters
2011General Hardness Amplification of Predicates and Puzzles - (Extended Abstract).
Thomas Holenstein, Grant Schoenebeck
2011Homomorphic Encryption: From Private-Key to Public-Key.
Ron Rothblum
2011Identity-Based Encryption Secure against Selective Opening Attack.
Mihir Bellare, Brent Waters, Scott Yilek
2011Impossibility of Blind Signatures from One-Way Permutations.
Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich
2011Input Locality and Hardness Amplification.
Andrej Bogdanov, Alon Rosen
2011Limits of Computational Differential Privacy in the Client/Server Setting.
Adam Groce, Jonathan Katz, Arkady Yerukhimovich
2011Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions.
Zvika Brakerski, Jonathan Katz, Gil Segev, Arkady Yerukhimovich
2011Limits on the Stretch of Non-adaptive Constructions of Pseudo-Random Generators.
Josh Bronson, Ali Juma, Periklis A. Papakonstantinou
2011On Black-Box Separations among Injective One-Way Functions.
Takahiro Matsuda, Kanta Matsuura
2011On the Black-Box Complexity of Optimally-Fair Coin Tossing.
Dana Dachman-Soled, Yehuda Lindell, Mohammad Mahmoody, Tal Malkin
2011On the Complexity of Non-adaptively Increasing the Stretch of Pseudorandom Generators.
Eric Miles, Emanuele Viola
2011One-Time Computable Self-erasing Functions.
Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
2011PCPs and the Hardness of Generating Private Synthetic Data.
Jonathan R. Ullman, Salil P. Vadhan
2011Parallel Repetition for Leakage Resilience Amplification Revisited.
Abhishek Jain, Krzysztof Pietrzak
2011Perfectly Secure Oblivious RAM without Random Oracles.
Ivan Damgård, Sigurd Meldgaard, Jesper Buus Nielsen
2011Practical Adaptive Oblivious Transfer from Simple Assumptions.
Matthew Green, Susan Hohenberger
2011Round-Optimal Password-Based Authenticated Key Exchange.
Jonathan Katz, Vinod Vaikuntanathan
2011Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer.
Yehuda Lindell, Benny Pinkas
2011Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma.
Stefano Tessaro
2011Signatures Resilient to Continual Leakage on Memory and Computation.
Tal Malkin, Isamu Teranishi, Yevgeniy Vahlis, Moti Yung
2011Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings
Yuval Ishai
2011Tight Bounds for Classical and Quantum Coin Flipping.
Esther Hänggi, Jürg Wullschleger
2011Towards Non-Black-Box Lower Bounds in Cryptography.
Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam
2011Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy.
Johannes Gehrke, Edward Lui, Rafael Pass
2011Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token.
Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade