TCC B

42 papers

YearTitle / Authors
2013A Cookbook for Black-Box Separations and a Recipe for UOWHFs.
Kfir Barhum, Thomas Holenstein
2013A Counterexample to the Chain Rule for Conditional HILL Entropy - And What Deniable Encryption Has to Do with It.
Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia
2013A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness.
Gilad Asharov, Yehuda Lindell, Tal Rabin
2013Algebraic (Trapdoor) One-Way Functions and Their Applications.
Dario Catalano, Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis
2013Analyzing Graphs with Node Differential Privacy.
Shiva Prasad Kasiviswanathan, Kobbi Nissim, Sofya Raskhodnikova, Adam D. Smith
2013Attribute-Based Functional Encryption on Lattices.
Xavier Boyen
2013Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead.
Steven A. Myers, Mona Sergi, Abhi Shelat
2013Characterizing the Cryptographic Properties of Reactive 2-Party Functionalities.
R. Amzi Jeffs, Mike Rosulek
2013Communication Locality in Secure Multi-party Computation - How to Run Sublinear Algorithms in a Distributed Setting.
Elette Boyle, Shafi Goldwasser, Stefano Tessaro
2013Computational Soundness of Coinductive Symbolic Security under Active Attacks.
Mohammad Hajiabadi, Bruce M. Kapron
2013Concurrent Zero Knowledge in the Bounded Player Model.
Vipul Goyal, Abhishek Jain, Rafail Ostrovsky, Silas Richelson, Ivan Visconti
2013Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing.
Ivan Damgård, Sarah Zakarias
2013Cryptographic Hardness of Random Local Functions-Survey.
Benny Applebaum
2013Distributed Oblivious RAM for Secure Two-Party Computation.
Steve Lu, Rafail Ostrovsky
2013Encrypted Messages from the Heights of Cryptomania.
Craig Gentry
2013Errata to (Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks.
David Xiao
2013Erratum: Succinct Non-interactive Arguments via Linear Interactive Proofs.
Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth
2013Feasibility and Completeness of Cryptographic Tasks in the Quantum World.
Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, Vassilis Zikas
2013Garbling XOR Gates "For Free" in the Standard Model.
Benny Applebaum
2013Hardness Preserving Reductions via Cuckoo Hashing.
Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor
2013Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens.
Nico Döttling, Thilo Mie, Jörn Müller-Quade, Tobias Nilges
2013Languages with Efficient Zero-Knowledge PCPs are in SZK.
Mohammad Mahmoody, David Xiao
2013Limits on the Usefulness of Random Oracles.
Iftach Haitner, Eran Omri, Hila Zarosim
2013Multi-Client Non-interactive Verifiable Computation.
Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid
2013On the (In)security of Fischlin's Paradigm.
Prabhanjan Ananth, Raghav Bhaskar, Vipul Goyal, Vanishree Rao
2013On the Circular Security of Bit-Encryption.
Ron Rothblum
2013On the Feasibility of Extending Oblivious Transfer.
Yehuda Lindell, Hila Zarosim
2013On the Power of Correlated Randomness in Secure Computation.
Yuval Ishai, Eyal Kushilevitz, Sigurd Meldgaard, Claudio Orlandi, Anat Paskin-Cherniavsky
2013Overcoming Weak Expectations.
Yevgeniy Dodis, Yu Yu
2013Public-Coin Concurrent Zero-Knowledge in the Global Hash Model.
Ran Canetti, Huijia Lin, Omer Paneth
2013Randomness-Dependent Message Security.
Eleanor Birrell, Kai-Min Chung, Rafael Pass, Sidharth Telang
2013Revisiting Lower and Upper Bounds for Selective Decommitments.
Rafail Ostrovsky, Vanishree Rao, Alessandra Scafuro, Ivan Visconti
2013Secure Computation for Big Data.
Tal Malkin
2013Signatures of Correct Computation.
Charalampos Papamanthou, Elaine Shi, Roberto Tamassia
2013Succinct Malleable NIZKs and an Application to Compact Shuffles.
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn
2013Succinct Non-interactive Arguments via Linear Interactive Proofs.
Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth
2013Testing the Lipschitz Property over Product Distributions with Applications to Data Privacy.
Kashyap Dixit, Madhav Jha, Sofya Raskhodnikova, Abhradeep Thakurta
2013Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings
Amit Sahai
2013Universally Composable Synchronous Computation.
Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas
2013Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments.
Rafael Pass
2013When Homomorphism Becomes a Liability.
Zvika Brakerski
2013Why "Fiat-Shamir for Proofs" Lacks a Proof.
Nir Bitansky, Dana Dachman-Soled, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, Adriana López-Alt, Daniel Wichs