Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova 0001 |
Two-Round Secure MPC from Indistinguishability Obfuscation. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai |
Obfuscation for Evasive Functions. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Alexandra Berkoff, Feng-Hao Liu |
Leakage Resilient Fully Homomorphic Encryption. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran 0001, Alon Rosen |
Lower Bounds in the Hardware Token Model. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi |
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dana Dachman-Soled, Mohammad Mahmoody, Tal Malkin |
Can Optimally-Fair Coin Tossing Be Based on One-Way Functions? |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Martin Hirt, Ueli Maurer, Pavel Raykov |
Broadcast Amplification. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti |
Statistical Concurrent Non-malleable Zero Knowledge. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou |
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Mahmoody, Hemanta K. Maji, Manoj Prabhakaran 0001 |
On the Power of Public-Key Encryption in Secure Computation. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi 0001 |
Continuous Non-malleable Codes. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai, Mor Weiss |
Probabilistically Checkable Proofs of Proximity with Zero-Knowledge. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yehuda Lindell (eds.) |
Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dana Dachman-Soled, Yael Tauman Kalai |
Securing Circuits and Protocols against 1/poly(k) Tampering Rate. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Takahiro Matsuda 0002 |
On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kai-Min Chung, Rafail Ostrovsky, Rafael Pass, Muthuramakrishnan Venkitasubramaniam, Ivan Visconti |
4-Round Resettably-Sound Zero Knowledge. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mahdi Cheraghchi, Venkatesan Guruswami |
Non-malleable Coding against Bit-Wise and Split-State Tampering. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Elette Boyle, Kai-Min Chung, Rafael Pass |
On Extractability Obfuscation. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Hofheinz, Andy Rupp |
Standard versus Selective Opening Security: Separation and Equivalence Results. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Aner Ben-Efraim, Carles Padró, Ilya Tyomkin |
Multi-linear Secret-Sharing Schemes. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zvika Brakerski, Guy N. Rothblum |
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dimitar Jetchev, Krzysztof Pietrzak |
How to Fake Auxiliary Input. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto |
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky |
Locally Updatable and Locally Decodable Codes. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gilad Asharov |
Towards Characterizing Complete Fairness in Secure Two-Party Computation. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Carmit Hazay, Arpita Patra |
One-Sided Adaptively Secure Two-Party Computation. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hoeteck Wee |
Dual System Encryption via Predicate Encodings. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Yuval Ishai, Ranjit Kumaresan, Eyal Kushilevitz |
On the Cryptographic Complexity of the Worst Functions. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Takahiro Matsuda 0002, Goichiro Hanaoka |
Chosen Ciphertext Security via Point Obfuscation. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya |
On the Impossibility of Structure-Preserving Deterministic Primitives. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Omkant Pandey |
Achieving Constant Round Leakage-Resilient Zero-Knowledge. |
TCC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shiva Prasad Kasiviswanathan, Kobbi Nissim, Sofya Raskhodnikova, Adam D. Smith |
Analyzing Graphs with Node Differential Privacy. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn |
Succinct Malleable NIZKs and an Application to Compact Shuffles. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Mahmoody, David Xiao |
Languages with Efficient Zero-Knowledge PCPs are in SZK. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dario Catalano, Dario Fiore 0001, Rosario Gennaro, Konstantinos Vamvourellis |
Algebraic (Trapdoor) One-Way Functions and Their Applications. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Serge Fehr, Jonathan Katz, Fang Song 0001, Hong-Sheng Zhou, Vassilis Zikas |
Feasibility and Completeness of Cryptographic Tasks in the Quantum World. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid |
Multi-Client Non-interactive Verifiable Computation. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Iftach Haitner, Eran Omri, Hila Zarosim |
Limits on the Usefulness of Random Oracles. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Benny Applebaum |
Cryptographic Hardness of Random Local Functions-Survey. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Prabhanjan Ananth, Raghav Bhaskar, Vipul Goyal, Vanishree Rao |
On the (In)security of Fischlin's Paradigm. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Steven A. Myers, Mona Sergi, Abhi Shelat |
Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Eleanor Birrell, Kai-Min Chung, Rafael Pass, Sidharth Telang |
Randomness-Dependent Message Security. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nico Döttling, Thilo Mie, Jörn Müller-Quade, Tobias Nilges |
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai, Eyal Kushilevitz, Sigurd Meldgaard, Claudio Orlandi, Anat Paskin-Cherniavsky |
On the Power of Correlated Randomness in Secure Computation. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Charalampos Papamanthou, Elaine Shi, Roberto Tamassia |
Signatures of Correct Computation. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Pass |
Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor |
Hardness Preserving Reductions via Cuckoo Hashing. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti, Huijia Lin, Omer Paneth |
Public-Coin Concurrent Zero-Knowledge in the Global Hash Model. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zvika Brakerski |
When Homomorphism Becomes a Liability. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Craig Gentry |
Encrypted Messages from the Heights of Cryptomania. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Yu Yu 0001 |
Overcoming Weak Expectations. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Boyen |
Attribute-Based Functional Encryption on Lattices. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tal Malkin |
Secure Computation for Big Data. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yehuda Lindell, Hila Zarosim |
On the Feasibility of Extending Oblivious Transfer. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Sarah Zakarias |
Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Benny Applebaum |
Garbling XOR Gates "For Free" in the Standard Model. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Gilad Asharov, Yehuda Lindell, Tal Rabin |
A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth |
Erratum: Succinct Non-interactive Arguments via Linear Interactive Proofs. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Amit Sahai (eds.) |
Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas |
Universally Composable Synchronous Computation. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Steve Lu 0001, Rafail Ostrovsky |
Distributed Oblivious RAM for Secure Two-Party Computation. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kfir Barhum, Thomas Holenstein |
A Cookbook for Black-Box Separations and a Recipe for UOWHFs. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | R. Amzi Jeffs, Mike Rosulek |
Characterizing the Cryptographic Properties of Reactive 2-Party Functionalities. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth |
Succinct Non-interactive Arguments via Linear Interactive Proofs. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Hajiabadi, Bruce M. Kapron |
Computational Soundness of Coinductive Symbolic Security under Active Attacks. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Elette Boyle, Shafi Goldwasser, Stefano Tessaro |
Communication Locality in Secure Multi-party Computation - How to Run Sublinear Algorithms in a Distributed Setting. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kashyap Dixit, Madhav Jha, Sofya Raskhodnikova, Abhradeep Thakurta |
Testing the Lipschitz Property over Product Distributions with Applications to Data Privacy. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vipul Goyal, Abhishek Jain 0002, Rafail Ostrovsky, Silas Richelson, Ivan Visconti |
Concurrent Zero Knowledge in the Bounded Player Model. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia |
A Counterexample to the Chain Rule for Conditional HILL Entropy - And What Deniable Encryption Has to Do with It. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ron Rothblum |
On the Circular Security of Bit-Encryption. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Xiao |
Errata to (Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nir Bitansky, Dana Dachman-Soled, Sanjam Garg, Abhishek Jain 0002, Yael Tauman Kalai, Adriana López-Alt, Daniel Wichs |
Why "Fiat-Shamir for Proofs" Lacks a Proof. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rafail Ostrovsky, Vanishree Rao, Alessandra Scafuro, Ivan Visconti |
Revisiting Lower and Upper Bounds for Selective Decommitments. |
TCC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Anupam Gupta 0001, Aaron Roth 0001, Jonathan R. Ullman |
Iterative Constructions and Private Data Release. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vipul Goyal, Virendra Kumar, Satyanarayana V. Lokam, Mohammad Mahmoody |
On Black-Box Reductions between Predicate Encryption Schemes. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Krzysztof Pietrzak, Alon Rosen, Gil Segev 0001 |
Lossy Functions Do Not Amplify Well. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dario Fiore 0001, Dominique Schröder |
Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Itay Berman, Iftach Haitner |
From Non-adaptive to Adaptive Pseudorandom Functions. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shafi Goldwasser, Allison B. Lewko, David A. Wilson |
Bounded-Collusion IBE from Key Homomorphism. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan |
Functional Re-encryption and Collusion-Resistant Obfuscation. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Dziembowski, Sebastian Faust |
Leakage-Resilient Circuits without Computational Assumptions. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zvika Brakerski, Yael Tauman Kalai |
A Parallel Repetition Theorem for Leakage Resilience. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nir Bitansky, Omer Paneth |
Point Obfuscation and 3-Round Zero-Knowledge. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Helger Lipmaa |
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai, Mohammad Mahmoody, Amit Sahai |
On Efficient Zero-Knowledge PCPs. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jae Hong Seo, Jung Hee Cheon |
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Sebastian Faust, Carmit Hazay |
Secure Two-Party Computation with Low Communication. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Benoît Libert, Moti Yung |
Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Anindya De |
Lower Bounds in Differential Privacy. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters |
Computing on Authenticated Data. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Abhishek Jain 0002, Tal Moran, Daniel Wichs |
Counterexamples to Hardness Amplification beyond Negligible. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou |
On the Security of the "Free-XOR" Technique. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nir Bitansky, Ran Canetti, Shai Halevi |
Leakage-Tolerant Interactive Protocols. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dimitar Jetchev, Onur Özen, Martijn Stam |
Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Iftach Haitner, Aris Tentes |
On the Instantiability of Hash-and-Sign RSA Signatures. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kai-Min Chung, Rafael Pass, Wei-Lung Dustin Tseng |
The Knowledge Tightness of Parallel Zero-Knowledge. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chongwon Cho, Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti |
Simultaneously Resettable Arguments of Knowledge. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Benny Applebaum, Andrej Bogdanov, Alon Rosen |
A Dichotomy for Local Small-Bias Generators. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Fuller 0001, Adam O'Neill, Leonid Reyzin |
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Thomas Ristenpart, Salil P. Vadhan |
Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources. |
TCC |
2012 |
DBLP DOI BibTeX RDF |
|