| 2014 | (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou |
| 2014 | 4-Round Resettably-Sound Zero Knowledge. Kai-Min Chung, Rafail Ostrovsky, Rafael Pass, Muthuramakrishnan Venkitasubramaniam, Ivan Visconti |
| 2014 | Achieving Constant Round Leakage-Resilient Zero-Knowledge. Omkant Pandey |
| 2014 | Broadcast Amplification. Martin Hirt, Ueli Maurer, Pavel Raykov |
| 2014 | Can Optimally-Fair Coin Tossing Be Based on One-Way Functions? Dana Dachman-Soled, Mohammad Mahmoody, Tal Malkin |
| 2014 | Chosen Ciphertext Security via Point Obfuscation. Takahiro Matsuda, Goichiro Hanaoka |
| 2014 | Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol. Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto |
| 2014 | Continuous Non-malleable Codes. Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi |
| 2014 | Dual System Encryption via Predicate Encodings. Hoeteck Wee |
| 2014 | How to Fake Auxiliary Input. Dimitar Jetchev, Krzysztof Pietrzak |
| 2014 | Leakage Resilient Fully Homomorphic Encryption. Alexandra Berkoff, Feng-Hao Liu |
| 2014 | Locally Updatable and Locally Decodable Codes. Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky |
| 2014 | Lower Bounds in the Hardware Token Model. Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, Alon Rosen |
| 2014 | Multi-linear Secret-Sharing Schemes. Amos Beimel, Aner Ben-Efraim, Carles Padró, Ilya Tyomkin |
| 2014 | Non-malleable Coding against Bit-Wise and Split-State Tampering. Mahdi Cheraghchi, Venkatesan Guruswami |
| 2014 | Obfuscation for Evasive Functions. Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai |
| 2014 | On Extractability Obfuscation. Elette Boyle, Kai-Min Chung, Rafael Pass |
| 2014 | On the Cryptographic Complexity of the Worst Functions. Amos Beimel, Yuval Ishai, Ranjit Kumaresan, Eyal Kushilevitz |
| 2014 | On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations. Takahiro Matsuda |
| 2014 | On the Impossibility of Structure-Preserving Deterministic Primitives. Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya |
| 2014 | On the Power of Public-Key Encryption in Secure Computation. Mohammad Mahmoody, Hemanta K. Maji, Manoj Prabhakaran |
| 2014 | One-Sided Adaptively Secure Two-Party Computation. Carmit Hazay, Arpita Patra |
| 2014 | Probabilistically Checkable Proofs of Proximity with Zero-Knowledge. Yuval Ishai, Mor Weiss |
| 2014 | Securing Circuits and Protocols against 1/poly(k) Tampering Rate. Dana Dachman-Soled, Yael Tauman Kalai |
| 2014 | Standard versus Selective Opening Security: Separation and Equivalence Results. Dennis Hofheinz, Andy Rupp |
| 2014 | Statistical Concurrent Non-malleable Zero Knowledge. Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti |
| 2014 | Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings Yehuda Lindell |
| 2014 | Towards Characterizing Complete Fairness in Secure Two-Party Computation. Gilad Asharov |
| 2014 | Two-Round Secure MPC from Indistinguishability Obfuscation. Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova |
| 2014 | Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures. Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi |
| 2014 | Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding. Zvika Brakerski, Guy N. Rothblum |