default search action
9. TCC 2012: Taormina, Sicily, Italy
- Ronald Cramer:
Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings. Lecture Notes in Computer Science 7194, Springer 2012, ISBN 978-3-642-28913-2
Secure Computation
- Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. 1-20 - Yuval Ishai, Rafail Ostrovsky, Hakan Seyalioglu:
Identifying Cheaters without an Honest Majority. 21-38 - Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou:
On the Security of the "Free-XOR" Technique. 39-53 - Ivan Damgård, Sebastian Faust, Carmit Hazay:
Secure Two-Party Computation with Low Communication. 54-74
(Blind) Signatures and Threshold Encryption
- Benoît Libert, Moti Yung:
Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions. 75-93 - Olivier Blazy, David Pointcheval, Damien Vergnaud:
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions. 94-111 - Yevgeniy Dodis, Iftach Haitner, Aris Tentes:
On the Instantiability of Hash-and-Sign RSA Signatures. 112-132 - Jae Hong Seo, Jung Hee Cheon:
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures. 133-150
Zero-Knowledge and Security Models
- Yuval Ishai, Mohammad Mahmoody, Amit Sahai:
On Efficient Zero-Knowledge PCPs. 151-168 - Helger Lipmaa:
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments. 169-189 - Nir Bitansky, Omer Paneth:
Point Obfuscation and 3-Round Zero-Knowledge. 190-208 - Ueli Maurer, Andreas Rüedlinger, Björn Tackmann:
Confidentiality and Integrity: A Constructive Perspective. 209-229
Leakage-Resilience
- Stefan Dziembowski, Sebastian Faust:
Leakage-Resilient Circuits without Computational Assumptions. 230-247 - Zvika Brakerski, Yael Tauman Kalai:
A Parallel Repetition Theorem for Leakage Resilience. 248-265 - Nir Bitansky, Ran Canetti, Shai Halevi:
Leakage-Tolerant Interactive Protocols. 266-284
Hash Functions
- Avradip Mandal, Jacques Patarin, Yannick Seurin:
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. 285-302 - Dimitar Jetchev, Onur Özen, Martijn Stam:
Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry. 303-320
Differential Privacy
- Anindya De:
Lower Bounds in Differential Privacy. 321-338 - Anupam Gupta, Aaron Roth, Jonathan R. Ullman:
Iterative Constructions and Private Data Release. 339-356
Pseudorandomness I
- Itay Berman, Iftach Haitner:
From Non-adaptive to Adaptive Pseudorandom Functions. 357-368 - Abhishek Jain, Krzysztof Pietrzak, Aris Tentes:
Hardness Preserving Constructions of Pseudorandom Functions. 369-382 - Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin:
Computational Extractors and Pseudorandomness. 383-403
Dedicated Encryption I
- Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan:
Functional Re-encryption and Collusion-Resistant Obfuscation. 404-421 - Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan:
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption. 422-439 - Vipul Goyal, Virendra Kumar, Satyanarayana V. Lokam, Mohammad Mahmoody:
On Black-Box Reductions between Predicate Encryption Schemes. 440-457
Security Amplification
- Krzysztof Pietrzak, Alon Rosen, Gil Segev:
Lossy Functions Do Not Amplify Well. 458-475 - Yevgeniy Dodis, Abhishek Jain, Tal Moran, Daniel Wichs:
Counterexamples to Hardness Amplification beyond Negligible. 476-493
Resettable and Parallel Zero Knowledge
- Sanjam Garg, Rafail Ostrovsky, Ivan Visconti, Akshay Wadia:
Resettable Statistical Zero Knowledge. 494-511 - Kai-Min Chung, Rafael Pass, Wei-Lung Dustin Tseng:
The Knowledge Tightness of Parallel Zero-Knowledge. 512-529 - Chongwon Cho, Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti:
Simultaneously Resettable Arguments of Knowledge. 530-547
Dedicated Encryption II
- Krzysztof Pietrzak:
Subspace LWE. 548-563 - Shafi Goldwasser, Allison B. Lewko, David A. Wilson:
Bounded-Collusion IBE from Key Homomorphism. 564-581 - Benjamin Fuller, Adam O'Neill, Leonid Reyzin:
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy. 582-599
Pseudorandomness II
- Benny Applebaum, Andrej Bogdanov, Alon Rosen:
A Dichotomy for Local Small-Bias Generators. 600-617 - Yevgeniy Dodis, Thomas Ristenpart, Salil P. Vadhan:
Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources. 618-635 - Dario Fiore, Dominique Schröder:
Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations. 636-653
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.