Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Chris Peikert |
Some Recent Progress in Lattice-Based Cryptography. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Salil P. Vadhan, Daniel Wichs |
Proofs of Retrievability via Hardness Amplification. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | S. Dov Gordon, Jonathan Katz |
Complete Fairness in Multi-party Computation without an Honest Majority. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shien Jin Ong, David C. Parkes, Alon Rosen, Salil P. Vadhan |
Fairness with an Honest Minority and a Rational Majority. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
game theory, fairness, secret sharing |
1 | Zvika Brakerski, Shafi Goldwasser, Guy N. Rothblum, Vinod Vaikuntanathan |
Weak Verifiable Random Functions. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets |
Security Amplification for InteractiveCryptographic Primitives. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee |
Simple, Black-Box Constructions of Adaptively Secure Protocols. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Serge Fehr, Christian Schaffner |
Composing Quantum Protocols in a Classical Environment. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Pass, Hoeteck Wee |
Black-Box Constructions of Two-Party Protocols from One-Way Functions. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
black-box constructions, zero-knowledge arguments, trapdoor commitments, parallel coin-tossing, non-malleable commitments, secure two-party computation |
1 | Hemanta K. Maji, Manoj Prabhakaran 0001, Mike Rosulek |
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Alon Rosen, Gil Segev 0001 |
Chosen-Ciphertext Security via Correlated Products. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Jonathan Katz, Adam D. Smith, Shabsi Walfish |
Composability and On-Line Deniability of Authentication. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Emily Shen, Elaine Shi, Brent Waters |
Predicate Privacy in Encryption Systems. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Iftach Haitner, Thomas Holenstein |
On the (Im)Possibility of Key Dependent Encryption. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
Key-dependent input, Black-box separations, One-way functions |
1 | Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan |
Simultaneous Hardcore Bits and Cryptography against Memory Attacks. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jürg Wullschleger |
Oblivious Transfer from Weak Noisy Channels. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs |
Universally Composable Multiparty Computation with Partially Isolated Parties. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
public-key infrastructure, multiparty computation, universally composable security |
1 | Iftach Haitner, Alon Rosen, Ronen Shaltiel |
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
Witness-Hiding, Arthur Merlin protocols, Zero-Knowledge, Black-box reductions |
1 | Cynthia Dwork |
The Differential Privacy Frontier (Extended Abstract). |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti |
Simulation-Based Concurrent Non-malleable Commitments and Decommitments. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Eli Biham, Yaron J. Goren, Yuval Ishai |
Basing Weak Public-Key Cryptography on Strong One-Way Functions. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
Merkle’s puzzles, quantum computing, Public-key cryptography, one-way functions, bounded storage model |
1 | Vadim Lyubashevsky, Daniele Micciancio |
Asymptotically Efficient Lattice-Based Digital Signatures. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | André Chailloux, Dragos Florin Ciocan, Iordanis Kerenidis, Salil P. Vadhan |
Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
noninteractive zero-knowledge proofs, quantum zero knowledge, computational complexity, cryptography, Arthur-Merlin games, commitment schemes |
1 | Ittai Abraham, Danny Dolev, Joseph Y. Halpern |
Lower Bounds on Implementing Robust and Resilient Mediators. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Gillat Kol, Moni Naor |
Cryptography and Game Theory: Designing Protocols for Exchanging Information. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Vipul Goyal, Jonathan Katz |
Universally Composable Multi-party Computation with an Unreliable Common Reference String. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Aggelos Kiayias, Hong-Sheng Zhou |
Equivocal Blind Signatures and Adaptive UC-Security. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Danny Harnik, Yuval Ishai, Eyal Kushilevitz, Jesper Buus Nielsen |
OT-Combiners via Secure Computation. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Noam Livne, Carles Padró |
Matroids Can Be Far from Ideal Secret Sharing. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Iftach Haitner |
Semi-honest to Malicious Oblivious Transfer - The Black-Box Way. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Katz |
Which Languages Have 4-Round Zero-Knowledge Proofs? |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Marc Fischlin, Anja Lehmann |
Multi-property Preserving Combiners for Hash Functions. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Lior Malka |
How to Achieve Perfect Simulation and A Complete Problem for Non-interactive Perfect Zero-Knowledge. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
non-interactive, perfect zero-knowledge, error shifting, complete problems, cryptography, perfect simulation |
1 | Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya |
P-signatures and Noninteractive Anonymous Credentials. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Huijia Lin, Rafael Pass, Muthuramakrishnan Venkitasubramaniam |
Concurrent Non-malleable Commitments from Any One-Way Function. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Pass, Muthuramakrishnan Venkitasubramaniam |
On Constant-Round Concurrent Zero-Knowledge. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Serge Fehr, Christian Schaffner |
Randomness Extraction Via delta -Biased Masking in the Presence of a Quantum Attacker. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ran Canetti (eds.) |
Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shai Halevi, Tal Rabin |
Degradation and Amplification of Computational Hardness. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg, Igal Yoffe |
The Layered Games Framework for Specifications and Analysis of Security Protocols. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Rosario Gennaro |
Faster and Shorter Password-Authenticated Key Exchange. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Paul Valiant |
Incrementally Verifiable Computation or Proofs of Knowledge Imply Time/Space Efficiency. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shai Halevi, Steven A. Myers, Charles Rackoff |
On Seed-Incompressible Functions. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Joe Kilian, André Madeira, Martin J. Strauss, Xuan Zheng |
Fast Private Norm Estimation and Heavy Hitters. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Carmit Hazay, Yehuda Lindell |
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shien Jin Ong, Salil P. Vadhan |
An Equivalence Between Zero Knowledge and Commitments. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Zuzana Beerliová-Trubíniová, Matthias Fitzi, Martin Hirt, Ueli M. Maurer, Vassilis Zikas |
MPC vs. SFE: Perfect Security in a Unified Corruption Model. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Zuzana Beerliová-Trubíniová, Martin Hirt |
Perfectly-Secure MPC with Linear Communication Complexity. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
hyper-invertible matrix, efficiency, Multi-party computation, perfect security |
1 | Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee |
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
black-box constructions, Public-key encryption, semantic security, non-malleability |
1 | Iftach Haitner, Jonathan J. Hoch, Gil Segev 0001 |
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sergei Izmalkov, Matt Lepinski, Silvio Micali |
Verifiably Secure Devices. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Katz |
Bridging Game Theory and Cryptography: Recent Results and Future Directions. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Nenad Dedic, Danny Harnik, Leonid Reyzin |
Saving Private Randomness in One-Way Functions and Pseudorandom Generators. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Daniele Micciancio, Scott Yilek |
The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Hirotada Kobayashi |
General Properties of Quantum Zero-Knowledge Proofs. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Fitzi, Matthew K. Franklin, Juan A. Garay, Harsha Vardhan Simhadri |
Towards Optimal and Efficient Perfectly Secure Message Transmission. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan |
Securely Obfuscating Re-encryption. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Oded Goldreich 0001 |
On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Dan Boneh, Brent Waters |
Conjunctive, Subset, and Range Queries on Encrypted Data. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yonatan Aumann, Yehuda Lindell |
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ben Adida, Douglas Wikström |
How to Shuffle in Public. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Jörn Müller-Quade, Dominique Unruh |
On the Necessity of Rewinding in Secure Multiparty Computation. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Matthew K. Franklin |
Weakly-Private Secret Sharing Schemes. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Shafi Goldwasser, Guy N. Rothblum |
On Best-Possible Obfuscation. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Douglas Wikström |
Designated Confirmer Signatures Revisited. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Salil P. Vadhan (eds.) |
Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yuval Ishai, Anat Paskin |
Evaluating Branching Programs on Encrypted Data. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Hofheinz, John Malone-Lee, Martijn Stam |
Obfuscation for Cryptographic Purposes. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
point functions, obfuscation |
1 | Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish |
Universally Composable Security with Global Setup. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Saurabh Panjwani |
Tackling Adaptive Corruptions in Multicast Encryption Protocols. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
Adaptive Corruptions, Selective Decryption, Multicast, Encryption |
1 | Hoeteck Wee |
One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
Interactive hashing, statistically hiding commitments, black-box lower bounds |
1 | Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew K. Franklin |
Secure Linear Algebra Using Linearly Recurrent Sequences. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
Secure Linear Algebra, Linearly Recurrent Sequences, Wiedemann’s Algorithm |
1 | Krzysztof Pietrzak, Douglas Wikström |
Parallel Repetition of Computationally Sound Protocols Revisited. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Serge Fehr |
Perfect NIZK with Adaptive Soundness. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Carl Bosley, Yevgeniy Dodis |
Does Privacy Require True Randomness? |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish |
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Michel Abdalla, Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt |
(Password) Authenticated Key Establishment: From 2-Party to Group. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
protocol compiler, common reference string model, key establishment, password-based authentication |
1 | Nicholas Hopper, David Molnar, David A. Wagner 0001 |
From Weak to Strong Watermarking. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Renen Hallak, Kobbi Nissim |
Private Approximation of Clustering and Vertex Cover. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jaume Martí-Farré, Carles Padró |
On Secret Sharing Schemes, Matroids and Polymatroids. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
Ideal access structures, Secret sharing, Matroids, Ideal secret sharing schemes, Information rate, Polymatroids |
1 | Yael Gertner, Tal Malkin, Steven A. Myers |
Towards a Separation of Semantic and CCA Security for Public Key Encryption. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jörn Müller-Quade, Dominique Unruh |
Long-Term Security and Universal Composability. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
long-term security, commitment, zero-knowledge, Universal Composability |
1 | Melissa Chase |
Multi-authority Attribute Based Encryption. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Hoeteck Wee |
Lower Bounds for Non-interactive Zero-Knowledge. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
set-up assumptions, lower bounds, Non-interactive zero-knowledge |
1 | Carmit Hazay, Jonathan Katz, Chiu-Yuen Koo, Yehuda Lindell |
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Christandl, Artur Ekert, Michal Horodecki, Pawel Horodecki, Jonathan Oppenheim, Renato Renner |
Unifying Classical and Quantum Key Distillation. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Remo Meier, Bartosz Przydatek, Jürg Wullschleger |
Robuster Combiners for Oblivious Transfer. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
robust combiners, weak oblivious transfer, oblivious transfer |
1 | Tatsuaki Okamoto |
Efficient Blind and Partially Blind Signatures Without Random Oracles. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Matthias Fitzi, Eike Kiltz, Jesper Buus Nielsen, Tomas Toft |
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kobbi Nissim, Enav Weinreb |
Communication Efficient Secure Linear Algebra. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Piotr Indyk, David P. Woodruff |
Polylogarithmic Private Approximations and Efficient Matching. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Adam Bender, Jonathan Katz, Ruggero Morselli |
Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Dziembowski |
Intrusion-Resilience Via the Bounded-Storage Model. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Dario Catalano, Yevgeniy Dodis, Ivan Visconti |
Mercurial Commitments: Minimal Assumptions and Efficient Constructions. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Prashant Puniya |
On the Relation Between the Ideal Cipher and the Random Oracle Models. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia Dwork, Frank McSherry, Kobbi Nissim, Adam D. Smith |
Calibrating Noise to Sensitivity in Private Data Analysis. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Holenstein |
Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Moti Yung, Yunlei Zhao |
Interactive Zero-Knowledge with Restricted Random Oracles. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Chi-Jen Lu |
On the Complexity of Parallel Hardness Amplification for One-Way Functions. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Amos Beimel, Noam Livne |
On Matroids and Non-ideal Secret Sharing. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|