


default search action
8. TCC 2011: Providence, RI, USA
- Yuval Ishai:

Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings. Lecture Notes in Computer Science 6597, Springer 2011, ISBN 978-3-642-19570-9
Hardness Amplification
- Andrej Bogdanov, Alon Rosen:

Input Locality and Hardness Amplification. 1-18 - Thomas Holenstein, Grant Schoenebeck

:
General Hardness Amplification of Predicates and Puzzles - (Extended Abstract). 19-36 - Stefano Tessaro:

Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma. 37-54
Invited Talk 1
- Luca Trevisan

:
Dense Model Theorems and Their Applications. 55-57
Leakage Resilience
- Abhishek Jain, Krzysztof Pietrzak:

Parallel Repetition for Leakage Resilience Amplification Revisited. 58-69 - Allison B. Lewko, Yannis Rouselakis, Brent Waters:

Achieving Leakage Resilience through Dual System Encryption. 70-88 - Tal Malkin, Isamu Teranishi, Yevgeniy Vahlis, Moti Yung:

Signatures Resilient to Continual Leakage on Memory and Computation. 89-106 - Shai Halevi, Huijia Lin:

After-the-Fact Leakage in Public-Key Encryption. 107-124
Tamper Resilience
- Stefan Dziembowski, Tomasz Kazana, Daniel Wichs:

One-Time Computable Self-erasing Functions. 125-143 - Ivan Damgård, Sigurd Meldgaard, Jesper Buus Nielsen

:
Perfectly Secure Oblivious RAM without Random Oracles. 144-163 - Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade:

Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token. 164-181 - Vipul Goyal, Adam O'Neill, Vanishree Rao:

Correlated-Input Secure Hash Functions. 182-200
Encryption
- Zvika Brakerski, Shafi Goldwasser, Yael Tauman Kalai:

Black-Box Circular-Secure Encryption beyond Affine Functions. 201-218 - Ron Rothblum:

Homomorphic Encryption: From Private-Key to Public-Key. 219-234 - Mihir Bellare, Brent Waters, Scott Yilek:

Identity-Based Encryption Secure against Selective Opening Attack. 235-252 - Dan Boneh, Amit Sahai, Brent Waters:

Functional Encryption: Definitions and Challenges. 253-273
Composable Security
- Huijia Lin, Rafael Pass

:
Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs. 274-292 - Jonathan Katz, Vinod Vaikuntanathan:

Round-Optimal Password-Based Authenticated Key Exchange. 293-310 - Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai:

Bringing People of Different Beliefs Together to Do UC. 311-328
Secure Computation
- Yehuda Lindell

, Benny Pinkas:
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer. 329-346 - Matthew Green, Susan Hohenberger:

Practical Adaptive Oblivious Transfer from Simple Assumptions. 347-363 - Daniel Kraschewski, Jörn Müller-Quade:

Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions. 364-381 - Gunnar Kreitz:

A Zero-One Law for Secure Multi-party Computation with Ternary Outputs. 382-399
Privacy
- Jonathan R. Ullman, Salil P. Vadhan:

PCPs and the Hardness of Generating Private Synthetic Data. 400-416 - Adam Groce, Jonathan Katz, Arkady Yerukhimovich:

Limits of Computational Differential Privacy in the Client/Server Setting. 417-431 - Johannes Gehrke

, Edward Lui, Rafael Pass
:
Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy. 432-449
Coin Tossing and Pseudorandomness
- Dana Dachman-Soled, Yehuda Lindell

, Mohammad Mahmoody
, Tal Malkin:
On the Black-Box Complexity of Optimally-Fair Coin Tossing. 450-467 - Esther Hänggi

, Jürg Wullschleger:
Tight Bounds for Classical and Quantum Coin Flipping. 468-485 - Hemanta K. Maji, Pichayoot Ouppaphan, Manoj Prabhakaran, Mike Rosulek:

Exploring the Limits of Common Coins Using Frontier Analysis of Protocols. 486-503 - Josh Bronson, Ali Juma, Periklis A. Papakonstantinou:

Limits on the Stretch of Non-adaptive Constructions of Pseudo-Random Generators. 504-521 - Eric Miles, Emanuele Viola:

On the Complexity of Non-adaptively Increasing the Stretch of Pseudorandom Generators. 522-539
Invited Talk 2
- Rafael Pass

:
Concurrent Security and Non-malleability. 540
Black-Box Constructions and Separations
- David Xiao:

(Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks. 541-558 - Zvika Brakerski, Jonathan Katz, Gil Segev, Arkady Yerukhimovich:

Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions. 559-578 - Rafael Pass

, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam:
Towards Non-Black-Box Lower Bounds in Cryptography. 579-596
Black-Box Separations
- Takahiro Matsuda, Kanta Matsuura

:
On Black-Box Separations among Injective One-Way Functions. 597-614 - Jonathan Katz, Dominique Schröder

, Arkady Yerukhimovich:
Impossibility of Blind Signatures from One-Way Permutations. 615-629

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














