default search action
13. TCC 2016: Tel Aviv, Israel
- Eyal Kushilevitz, Tal Malkin:
Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9563, Springer 2016, ISBN 978-3-662-49098-3
Zero Knowledge and PCP
- Yuval Ishai, Mor Weiss, Guang Yang:
Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits. 3-32 - Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Madars Virza:
Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs. 33-64 - Benny Applebaum, Pavel Raykov:
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back. 65-82 - Michele Ciampi, Giuseppe Persiano, Luisa Siniscalchi, Ivan Visconti:
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles. 83-111 - Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti:
Improved OR-Composition of Sigma-Protocols. 112-141
Oblivious RAM
- Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi, Daniel Wichs:
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM. 145-174 - Elette Boyle, Kai-Min Chung, Rafael Pass:
Oblivious Parallel RAM and Applications. 175-204 - Binyi Chen, Huijia Lin, Stefano Tessaro:
Oblivious Parallel RAM: Improved Efficiency and Generic Constructions. 205-234
ABE and IBE
- Hoeteck Wee:
Déjà Q: Encore! Un Petit IBE. 237-258 - Shashank Agrawal, Melissa Chase:
A Study of Pair Encodings: Predicate Encryption in Prime Order Groups. 259-288
Codes and Interactive Proofs
- Stefan Dziembowski, Sebastian Faust, Maciej Skórski:
Optimal Amplification of Noisy Leakages. 291-318 - Siyao Guo, Pavel Hubácek, Alon Rosen, Margarita Vald:
Rational Sumchecks. 319-351 - Allison Bishop, Yevgeniy Dodis:
Interactive Coding for Interactive Proofs. 352-366 - Nishanth Chandran, Bhavana Kanukurthi, Srinivasan Raghuraman:
Information-Theoretic Local Non-malleable Codes and Their Applications. 367-392 - Divesh Aggarwal, Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Optimal Computational Split-state Non-malleable Codes. 393-417
Limitations of Obfuscation and Obfuscation-Avoiding Constructions
- Mark Zhandry:
How to Avoid Obfuscation Using Witness PRFs. 421-448 - Ilan Komargodski, Mark Zhandry:
Cutting-Edge Cryptography Through the Lens of Secret Sharing. 449-479 - Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry:
Functional Encryption Without Obfuscation. 480-511 - Gilad Asharov, Gil Segev:
On Constructing One-Way Permutations from Indistinguishability Obfuscation. 512-541 - Mihir Bellare, Igors Stepanovs, Stefano Tessaro:
Contention in Cryptoland: Obfuscation, Leakage and UCE. 542-564 - Mihir Bellare, Igors Stepanovs:
Point-Function Obfuscation: A Framework and Generic Constructions. 565-594
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.