Theory of Cryptography Conference (TCC) 2021:
Kobbi Nissim and Brent Waters (Eds.):
TCC 2021
Raleigh, North Carolina, United States
November 8-11, 2021
cryptodb information for TCC 2021
Organizational Committee
Program CommitteeChairs:
Kobbi Nissim and Brent Waters
Kobbi Nissim and Brent Waters
Masayuki Abe
Ittai Abraham
Benny Applebaum
Gilad Asharov
Amos Beimel
Andrej Bogdanov
Elette Boyle
Chris Brzuska
Mark Bun
Yilei Chen
Itai Dinur
Pooya Farshim
Sanjam Garg
Rishab Goyal
Siyao Guo
Iftach Haitner
Mohammad Hajiabadi
Carmit Hazay
Yuval Ishai
Abhishek Jain
Stacey Jeffery
Lisa Kohl
Ilan Komargodski
Benoît Libert
Huijia Lin
Alex Lombardi
Vadim Lyubashevsky
Jesper Buus Nielsen
Ryo Nishimaki
Omkant Pandey
Omer Paneth
Manoj Prabhakaran
Leonid Reyzin
Alon Rosen
Guy N. Rothblum
Christian Schaffner
Peter Scholl
Gil Segev
Justin Thaler
Muthuramakrishnan Venkitasubramaniam
Mark Zhandry
- Foundations I
- Simple Constructions from (Almost) Regular One-Way Functions,
Jiapeng Zhang, Noam Mazor,
bibinfo, video - BKW Meets Fourier: New Algorithms for LPN with Sparse Parities,
Dana Dachman-Soled, Aria Shahverdi, Huijing Gong, Hunter Kippen,
bibinfo, video - Towards Tight Adaptive Security of Non-Interactive Key Exchange,
Dennis Hofheinz, Julia Hesse, Lisa Kohl, Roman Langrehr,
bibinfo, video - Covert Learning: How to Learn with an Untrusted Intermediary,
Ran Canetti, Ari Karchmer,
bibinfo, video - Distributed Merkle's Puzzles,
Itai Dinur, Ben Hasson,
bibinfo, video
- Simple Constructions from (Almost) Regular One-Way Functions,
- Quantum I
- Secure Quantum Computation with Classical Communication,
James Bartusek,
bibinfo, video - Secure Software Leasing Without Assumptions,
Anne Broadbent, Stacey Jeffery, Sébastien Lord, Supartha Podder, Aarthi Sundaram,
bibinfo, video - Quantum Key-length Extension,
Stefano Tessaro, Fang Song, Joseph Jaeger,
bibinfo, video - Unclonable Encryption, Revisited,
Prabhanjan Ananth, Fatih Kaleoglu,
bibinfo, video
- Secure Quantum Computation with Classical Communication,
- Multi-party Computation I
- Information-Theoretically Secure MPC against Mixed Dynamic Adversaries,
Ivan Damgård, Divya Ravi, Daniel Escudero,
bibinfo, video - On Actively-Secure Elementary MPC Reductions,
Benny Applebaum, Aarushi Goel,
bibinfo, video - Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (Timed) Assumptions,
Jörn Müller-Quade, Brandon Broadnax, Jeremias Mechler,
bibinfo, video - On Communication-Efficient Asynchronous MPC with Adaptive Security,
Martin Hirt, Chen-Da Liu-Zhang, Annick Chopard,
bibinfo, video - Efficient Perfectly Secure Computation with Optimal Resilience,
Ittai Abraham, Gilad Asharov, Avishay Yanai,
bibinfo, video - On Communication Models and Best-Achievable Security in Two-Round MPC,
Manoj Prabhakaran, Abhishek Jain, Aarushi Goel Rajeev Raghunath, Rajeev Raghunath,
bibinfo, video - Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation,
Shai Halevi, Yuval Ishai, Niv Gilboa, Elette Boyle, Fabrice Benhamouda, Ariel Nof,
bibinfo, video
- Information-Theoretically Secure MPC against Mixed Dynamic Adversaries,
- ABE, FE, Obfuscation and Non Traditional Models
- Multi-Party Functional Encryption,
Shweta Agrawal, Rishab Goyal, Junichi Tomida,
bibinfo, video - Succinct LWE Sampling, Random Polynomials, and Obfuscation,
Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs, Willy Quach, Lalita Devadas,
bibinfo, video - ABE for DFA from LWE against Bounded Collusions, Revisited,
Hoeteck Wee,
bibinfo - Disappearing Cryptography in the Bounded Storage Model,
Mark Zhandry, Jiaxin Guan,
bibinfo, video - Direct Product Hardness Amplification,
Ueli Maurer, David Lanzenberger,
bibinfo, video - Non-Malleable Time-Lock Puzzles and Applications,
Rafael Pass, Ilan Komargodski, Cody Freitag, Naomi Sirkin,
bibinfo, video - Rate-1 Quantum Fully Homomorphic Encryption,
Nico Döttling, Giulio Malavolta, Orestis Chardouvelis,
bibinfo, video
- Multi-Party Functional Encryption,
- Invited Talk
Non-Interactive Proofs: How far can we go?
Abhishek Jain
video - Zero Knowledge and Proof Systems
- Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs,
Vinod Vaikuntanathan, Yael Tauman Kalai, Rachel Yun Zhang,
bibinfo, video - Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness,
Susumu Kiyoshima,
bibinfo, video - Acyclicity Programming for Sigma-Protocols,
Masayuki Abe, Miyako Ohkubo, Alon Rosen, Andrej Bogdanov, Miguel Ambrona,
bibinfo, video - Statistical ZAPs from Group-Based Assumptions,
Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu, Elahe Sadeghi,
bibinfo, video - Generalized Proofs of Knowledge with Fully Dynamic Setup,
Christian Badertscher, Ueli Maurer, Daniel Jost,
bibinfo, video - Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions,
Lior Rotem,
bibinfo, video
- Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs,
- Quantum II
- Secure Software Leasing from Standard Assumptions,
Ryo Nishimaki, Takashi Yamakawa, Fuyuki Kitagawa,
bibinfo, video - Post-quantum Resettably-Sound Zero Knowledge,
Nir Bitansky, Omri Shmueli, Michael Kellner,
bibinfo - Unifying Presampling via Concentration Bounds,
Siyao Guo, Jiapeng Zhang, Qipeng Liu, Qian Li,
bibinfo, video - Relationships between quantum IND-CPA notions,
Dominique Unruh, Tore V. Carstens, Ehsan Ebrahimi, Gelo N. Tabia,
bibinfo, video - Classical Binding for Quantum Commitments,
Zvika Brakerski, Nir Bitansky,
bibinfo, video
- Secure Software Leasing from Standard Assumptions,
- Multi-party Computation II
- Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback (eprint version),
Martin Hirt, Chen-Da Liu-Zhang, Giovanni Deligios,
bibinfo, video - Two-Round Maliciously Secure Computation with Super-Polynomial Simulation,
Vipul Goyal, Dakshita Khurana, Giulio Malavolta, James Bartusek, Amit Agarwal,
bibinfo, video - Adaptive Security of Multi-Party Protocols, Revisited,
Martin Hirt, Ueli Maurer, Chen-Da Liu-Zhang,
bibinfo, video - Dory: Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitments,
Jonathan Lee,
bibinfo, video - Multi-party PSM, Revisited: Improved Communication and Unbalanced Communication,
Tianren Liu, Léonard Assouline,
bibinfo, video - Blockchains Enable Non-Interactive MPC,
Vipul Goyal, Bryan Parno, Yifan Song, Elisaweta Masserova,
bibinfo, video
- Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback (eprint version),
- PIR, Encrypted RAM, Commitments
- Random-Index PIR and Applications,
Shai Halevi, Craig Gentry, Jesper Buus Nielsen, Bernardo Magri, Sophia Yakoubov,
bibinfo, video - Forward Secret Encrypted RAM: Lower Bounds and Applications,
Yevgeniy Dodis, Kevin Yeo, Alexander Bienstock,
bibinfo, video - Laconic Private Set Intersection and Applications,
Sanjam Garg, Nico Döttling, Mohammad Hajiabadi, Navid Alamati, Pedro Branco, Sihang Pu,
bibinfo, video - Non-Malleable Vector Commitments via Local Equivocability,
Gil Segev, Lior Rotem,
bibinfo, video - Vector and Functional Commitments from Lattices,
Chris Peikert, Zachary Pepin, Chad Sharp,
bibinfo, video - Updatable Public Key Encryption in the Standard Model,
Yevgeniy Dodis, Daniel Wichs, Harish Karthikeyan,
bibinfo, video
- Random-Index PIR and Applications,
- Foundations II
- On Derandomizing Yao’s Weak-to-Strong OWF Construction,
Geoffroy Couteau, Chris Brzuska, Felix Rohrbach, Pihla Karanko,
bibinfo, video - On Treewidth, Separators and Yao’s Garbling,
Krzysztof Pietrzak, Chethan Kamath, Karen Klein,
bibinfo, video - Oblivious Transfer from Trapdoor Permutations in Minimal Rounds,
Rafail Ostrovsky, Vipul Goyal, Abhishek Jain, Michele Ciampi, Arka Rai Choudhuri,
bibinfo, video - The Cost of Adaptivity in Security Games on Graphs,
Krzysztof Pietrzak, Michael Walter, Chethan Kamath, Karen Klein,
bibinfo, video - Concurrent Composition of Differential Privacy,
Salil Vadhan, Tianhao Wang,
bibinfo, video - On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger,
Vassilis Zikas, Julia Hesse, Christian Badertscher,
bibinfo, video - Polynomial-time targeted attacks on coin-tossing for any number of corruptions,
Omid Etesami, Mohammad Mahmoody, Saeed Mahloujifar, Ji Gao,
bibinfo, video
- On Derandomizing Yao’s Weak-to-Strong OWF Construction,
- Zero Knowledge, OT, Key Management
- Tight Security Bounds for Micali’s SNARGs,
Alessandro Chiesa, Eylon Yogev,
bibinfo, video - Fully-succinct Publicly Verifiable Delegation from Constant-Size Assumptions,
Alonso González, Alexandros Zacharakis,
bibinfo, video - On expected polynomial runtime in cryptography,
Michael Klooß,
bibinfo, video - Amortizing Rate-1 OT and Applications to PIR and PSI,
Melissa Chase, Sanjam Garg, Mohammad Hajiabadi, Peihan Miao, Jialin Li,
bibinfo, video - Ring-based Identity Based Encryption – Asymptotically Shorter MPK and Tighter Security,
Feng-Hao Liu, Zhedong Wang, Parhat Abla, Han Wang,
bibinfo, video - Grafting Key Trees: Efficient Key Management for Overlapping Groups,
Joël Alwen, Krzysztof Pietrzak, Michael Walter, Benedikt Auerbach, Karen Klein, Guillermo Pascual-Perez, Mirza Ahad Baig, Miguel Cueto Noval,
bibinfo, video - Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy,
Qiang Tang, Hanwen Feng,
bibinfo, video
- Tight Security Bounds for Micali’s SNARGs,
- Routing, Signatures, Commitments, Timelock
- Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption,
Anna Lysyanskaya, Megumi Ando,
bibinfo, video - Trojan-Resilience without Cryptography,
Krzysztof Pietrzak, Stefan Dziembowski, Suvradip Chakraborty, Malgorzata Galazka, Tomasz Lizurej, Michelle Yeo,
bibinfo, video - Policy-Compliant Signatures,
Christian Badertscher, Christian Matt, Hendrik Waldner,
bibinfo, video - Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity,
Daniele Venturi, Antonio Faonio, Gianluca Brian,
bibinfo, video - On the Impossibility of Purely Algebraic Signatures,
Eike Kiltz, Dennis Hofheinz, Sven Schäge, Nico Döttling, Bogdan Ursu, Dominik Hartmann,
bibinfo, video
- Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption,