TCC B

31 papers

YearTitle / Authors
2014(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou
20144-Round Resettably-Sound Zero Knowledge.
Kai-Min Chung, Rafail Ostrovsky, Rafael Pass, Muthuramakrishnan Venkitasubramaniam, Ivan Visconti
2014Achieving Constant Round Leakage-Resilient Zero-Knowledge.
Omkant Pandey
2014Broadcast Amplification.
Martin Hirt, Ueli Maurer, Pavel Raykov
2014Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?
Dana Dachman-Soled, Mohammad Mahmoody, Tal Malkin
2014Chosen Ciphertext Security via Point Obfuscation.
Takahiro Matsuda, Goichiro Hanaoka
2014Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol.
Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto
2014Continuous Non-malleable Codes.
Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi
2014Dual System Encryption via Predicate Encodings.
Hoeteck Wee
2014How to Fake Auxiliary Input.
Dimitar Jetchev, Krzysztof Pietrzak
2014Leakage Resilient Fully Homomorphic Encryption.
Alexandra Berkoff, Feng-Hao Liu
2014Locally Updatable and Locally Decodable Codes.
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky
2014Lower Bounds in the Hardware Token Model.
Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, Alon Rosen
2014Multi-linear Secret-Sharing Schemes.
Amos Beimel, Aner Ben-Efraim, Carles Padró, Ilya Tyomkin
2014Non-malleable Coding against Bit-Wise and Split-State Tampering.
Mahdi Cheraghchi, Venkatesan Guruswami
2014Obfuscation for Evasive Functions.
Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai
2014On Extractability Obfuscation.
Elette Boyle, Kai-Min Chung, Rafael Pass
2014On the Cryptographic Complexity of the Worst Functions.
Amos Beimel, Yuval Ishai, Ranjit Kumaresan, Eyal Kushilevitz
2014On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations.
Takahiro Matsuda
2014On the Impossibility of Structure-Preserving Deterministic Primitives.
Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya
2014On the Power of Public-Key Encryption in Secure Computation.
Mohammad Mahmoody, Hemanta K. Maji, Manoj Prabhakaran
2014One-Sided Adaptively Secure Two-Party Computation.
Carmit Hazay, Arpita Patra
2014Probabilistically Checkable Proofs of Proximity with Zero-Knowledge.
Yuval Ishai, Mor Weiss
2014Securing Circuits and Protocols against 1/poly(k) Tampering Rate.
Dana Dachman-Soled, Yael Tauman Kalai
2014Standard versus Selective Opening Security: Separation and Equivalence Results.
Dennis Hofheinz, Andy Rupp
2014Statistical Concurrent Non-malleable Zero Knowledge.
Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti
2014Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings
Yehuda Lindell
2014Towards Characterizing Complete Fairness in Secure Two-Party Computation.
Gilad Asharov
2014Two-Round Secure MPC from Indistinguishability Obfuscation.
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova
2014Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures.
Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi
2014Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding.
Zvika Brakerski, Guy N. Rothblum