default search action
7. TCC 2010: Zurich, Switzerland
- Daniele Micciancio:
Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings. Lecture Notes in Computer Science 5978, Springer 2010, ISBN 978-3-642-11798-5
Parallel Repetition
- Johan Håstad, Rafael Pass, Douglas Wikström, Krzysztof Pietrzak:
An Efficient Parallel Repetition Theorem. 1-18 - Kai-Min Chung, Feng-Hao Liu:
Parallel Repetition Theorems for Interactive Arguments. 19-36 - Charanjit S. Jutla:
Almost Optimal Bounds for Direct Product Threshold Theorem. 37-51
Obfuscation
- Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs:
On Symmetric Encryption and Point Obfuscation. 52-71 - Ran Canetti, Guy N. Rothblum, Mayank Varia:
Obfuscation of Hyperplane Membership. 72-89
Invited Talk
- Yuval Ishai:
Secure Computation and Its Diverse Applications. 90
Multiparty Computation
- S. Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostrovsky, Amit Sahai:
On Complete Primitives for Fairness. 91-108 - Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi:
On the Necessary and Sufficient Assumptions for UC Computation. 109-127 - Ivan Damgård, Martin Geisler, Jesper Buus Nielsen:
From Passive to Covert Security at Low Cost. 128-145
CCA Security
- Ronald Cramer, Dennis Hofheinz, Eike Kiltz:
A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems. 146-164 - Yevgeniy Vahlis:
Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs. 165-182
Threshold Cryptography and Secret Sharing
- Ivan Damgård, Gert Læssøe Mikkelsen:
Efficient, Robust and Constant-Round Distributed RSA Key Generation. 183-200 - Rikke Bendlin, Ivan Damgård:
Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems. 201-218 - Oriol Farràs, Carles Padró:
Ideal Hierarchical Secret Sharing Schemes. 219-236
Symmetric Cryptography
- Ueli M. Maurer, Stefano Tessaro:
A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch. 237-254 - David Goldenberg, Moses D. Liskov:
On Related-Secret Pseudorandomness. 255-272 - Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin:
A Domain Extender for the Ideal Cipher. 273-289 - Marc Fischlin, Anja Lehmann:
Delayed-Key Message Authentication for Streams. 290-307
Key-Leakage and Tamper-Resistance
- Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia:
Founding Cryptography on Tamper-Proof Hardware Tokens. 308-326 - Vladimir Kolesnikov:
Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens. 327-342 - Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy N. Rothblum:
Leakage-Resilient Signatures. 343-360 - Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kalai, Chris Peikert, Vinod Vaikuntanathan:
Public-Key Encryption Schemes with Auxiliary Inputs. 361-381 - Vadim Lyubashevsky, Adriana Palacio, Gil Segev:
Public-Key Cryptographic Primitives Provably as Secure as Subset Sum. 382-400
Rationality and Privacy
- Ronen Gradwohl:
Rationality in the Full-Information Model. 401-418 - Georg Fuchsbauer, Jonathan Katz, David Naccache:
Efficient Rational Secret Sharing in Standard Communication Networks. 419-436 - Amos Beimel, Shiva Prasad Kasiviswanathan, Kobbi Nissim:
Bounds on the Sample Complexity for Private Learning and Private Data Release. 437-454
Public-Key Encryption
- Allison B. Lewko, Brent Waters:
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. 455-479 - Michel Abdalla, Mihir Bellare, Gregory Neven:
Robust Encryption. 480-497
Invited Talk
- Jan Camenisch:
Privacy-Enhancing Cryptography: From Theory into Practice. 498
Zero-Knowledge
- Benoît Libert, Moti Yung:
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs. 499-517 - Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam:
Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing Model. 518-534 - Rafail Ostrovsky, Omkant Pandey, Ivan Visconti:
Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge. 535-552 - Endre Bangerter, Jan Camenisch, Stephan Krenn:
Efficiency Limitations for Σ-Protocols for Group Homomorphisms. 553-571 - Eleanor Birrell, Salil P. Vadhan:
Composition of Zero-Knowledge Proofs with Efficient Provers. 572-587 - Rafael Pass, Muthuramakrishnan Venkitasubramaniam:
Private Coins versus Public Coins in Zero-Knowledge Proof Systems. 588-605
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.