


default search action
16th TCC 2018: Panaji, India
- Amos Beimel, Stefan Dziembowski

:
Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings, Part II. Lecture Notes in Computer Science 11240, Springer 2018, ISBN 978-3-030-03809-0
MPC Protocols
- Rio LaVigne, Chen-Da Liu Zhang

, Ueli Maurer, Tal Moran, Marta Mularczyk
, Daniel Tschudi
:
Topology-Hiding Computation Beyond Semi-Honest Adversaries. 3-35 - Alexander R. Block

, Divya Gupta, Hemanta K. Maji, Hai H. Nguyen:
Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions). 36-65 - Matteo Campanelli

, Rosario Gennaro:
Fine-Grained Secure Computation. 66-97 - Mike Rosulek, Morgan Shirley

:
On the Structure of Unconditional UC Hybrid Protocols. 98-126
Order-Revealing Encryption and Symmetric Encryption
- Mark Zhandry

, Cong Zhang:
Impossibility of Order-Revealing Encryption in Idealized Models. 129-158 - David Cash, Cong Zhang:

A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage. 159-176 - Gil Segev, Ido Shahaf:

Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound. 177-191 - Bart Mennink:

Towards Tight Security of Cascaded LRW2. 192-222
Information-Theoretic Cryptography II and Quantum Cryptography
- Ivan Damgård, Tomasz Kazana, Maciej Obremski, Varun Raj, Luisa Siniscalchi

:
Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments. 225-254 - Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin:

Best Possible Information-Theoretic MPC. 255-281 - Frédéric Dupuis, Serge Fehr, Philippe Lamontagne, Louis Salvail:

Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation. 282-314 - Serge Fehr:

Classical Proofs for the Quantum Collapsing Property of Classical Hash Functions. 315-338
LWE-Based Cryptography
- Yilei Chen, Vinod Vaikuntanathan, Brent Waters, Hoeteck Wee, Daniel Wichs:

Traitor-Tracing from LWE Made Simple and Attribute-Based. 341-369 - Zvika Brakerski, Nico Döttling:

Two-Message Statistically Sender-Private OT from LWE. 370-390 - Benoît Libert, Damien Stehlé, Radu Titiu:

Adaptively Secure Distributed PRFs from \mathsf LWE. 391-421
iO and Authentication
- Sanjam Garg, Akshayaram Srinivasan:

A Simple Construction of iO for Turing Machines. 425-454 - Prabhanjan Ananth, Alex Lombardi:

Succinct Garbling Schemes from Functional Encryption Through a Local Simulation Paradigm. 455-472 - Shweta Agrawal, Monosij Maitra:

FE and iO for Turing Machines from Minimal Assumptions. 473-512 - Fermi Ma, Mark Zhandry

:
The MMap Strikes Back: Obfuscation and New Multilinear Maps Immune to CLT13 Zeroizing Attacks. 513-543 - James Bartusek

, Jiaxin Guan, Fermi Ma, Mark Zhandry
:
Return of GGH15: Provable Security Against Zeroizing Attacks. 544-574 - Moni Naor, Lior Rotem, Gil Segev:

The Security of Lazy Users in Out-of-Band Authentication. 575-599
ORAM and PRF
- Mor Weiss

, Daniel Wichs:
Is There an Oblivious RAM Lower Bound for Online Reads? 603-635 - T.-H. Hubert Chan, Kartik Nayak, Elaine Shi:

Perfectly Secure Oblivious Parallel RAM. 636-668 - Willy Quach, Daniel Wichs, Giorgos Zirdelis:

Watermarking PRFs Under Standard Assumptions: Public Marking and Security with Extraction Queries. 669-698 - Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu:

Exploring Crypto Dark Matter: - New Simple PRF Candidates and Their Applications. 699-729

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














