What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from TCC 2016
Year
Venue
Title
2016
TCC
3-Message Zero Knowledge Against Human Ignorance
Nir Bitansky
Zvika Brakerski
Yael Tauman Kalai
Omer Paneth
Vinod Vaikuntanathan
2016
TCC
A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
Shashank Agrawal
Melissa Chase
2016
TCC
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles
Michele Ciampi
Giuseppe Persiano
Luisa Siniscalchi
Ivan Visconti
2016
TCC
Access Control Encryption: Enforcing Information Flow with Cryptography
Ivan Damgård
Helene Haagh
Claudio Orlandi
2016
TCC
Adaptive Security of Yao's Garbled Circuits
Zahra Jafargholi
Daniel Wichs
2016
TCC
Adaptive Security with Quasi-Optimal Rate
Brett Hemenway
Rafail Ostrovsky
Silas Richelson
Alon Rosen
2016
TCC
Adaptive Succinct Garbled RAM or: How to Delegate Your Database
Ran Canetti
Yilei Chen
Justin Holmgren
Mariana Raykova
2016
TCC
Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography
Dennis Hofheinz
2016
TCC
Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious
Bar Alon
Eran Omri
2016
TCC
Binary AMD Circuits from Secure Multiparty Computation
Daniel Genkin
Yuval Ishai
Mor Weiss
2016
TCC
Characterization of Secure Multiparty Computation Without Broadcast
Ran Cohen
Iftach Haitner
Eran Omri
Lior Rotem
2016
TCC
Compactness vs Collusion Resistance in Functional Encryption
Baiyu Li
Daniele Micciancio
2016
TCC
Composable Adaptive Secure Protocols Without Setup Under Polytime Assumptions
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
2016
TCC
Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity
Carmit Hazay
Antigoni Polychroniadou
Muthuramakrishnan Venkitasubramaniam
2016
TCC
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
Mark Bun
Thomas Steinke
2016
TCC
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
Carmit Hazay
Avishay Yanai
2016
TCC
Contention in Cryptoland: Obfuscation, Leakage and UCE
Mihir Bellare
Igors Stepanovs
Stefano Tessaro
2016
TCC
Cross and Clean: Amortized Garbled Circuits with Constant Overhead
Jesper Buus Nielsen
Claudio Orlandi
2016
TCC
Cryptographic Assumptions: A Position Paper
★
Invited paper
Shafi Goldwasser
Yael Tauman Kalai
2016
TCC
Cutting-Edge Cryptography Through the Lens of Secret Sharing
Ilan Komargodski
Mark Zhandry
2016
TCC
Déjà Q: Encore! Un Petit IBE
Hoeteck Wee
2016
TCC
Delegating RAM Computations
Yael Tauman Kalai
Omer Paneth
2016
TCC
Delegating RAM Computations with Adaptive Soundness and Privacy
Prabhanjan Ananth
Yu-Chi Chen
Kai-Min Chung
Huijia Lin
Wei-Kai Lin
2016
TCC
Deniable Attribute Based Encryption for Branching Programs from LWE
Daniel Apon
Xiong Fan
Feng-Hao Liu
2016
TCC
Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond
Jeremiah Blocki
Hong-Sheng Zhou
2016
TCC
Differential Privacy: Ten Years of Making Noise
★
Invited talk
Cynthia Dwork
Frank McSherry
Kobbi Nissim
Adam Smith
2016
TCC
Efficient Secure Multiparty Computation with Identifiable Abort
Carsten Baum
Emmanuela Orsini
Peter Scholl
2016
TCC
Fast Pseudorandom Functions Based on Expander Graphs
Benny Applebaum
Pavel Raykov
2016
TCC
From Cryptomania to Obfustopia Through Secret-Key Functional Encryption
Nir Bitansky
Ryo Nishimaki
Alain Passelègue
Daniel Wichs
2016
TCC
From Indifferentiability to Constructive Cryptography (and Back)
Ueli Maurer
Renato Renner
2016
TCC
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back
Benny Applebaum
Pavel Raykov
2016
TCC
Functional Encryption for Turing Machines
Prabhanjan Vijendra Ananth
Amit Sahai
2016
TCC
Functional Encryption Without Obfuscation
Sanjam Garg
Craig Gentry
Shai Halevi
Mark Zhandry
2016
TCC
Homomorphic Evaluation Requires Depth
Andrej Bogdanov
Chin Ho Lee
2016
TCC
How to Avoid Obfuscation Using Witness PRFs
Mark Zhandry
2016
TCC
How to Share a Secret, Infinitely
Ilan Komargodski
Moni Naor
Eylon Yogev
2016
TCC
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings
Rafael Pass
Abhi Shelat
2016
TCC
Improved OR-Composition of Sigma-Protocols
Michele Ciampi
Giuseppe Persiano
Alessandra Scafuro
Luisa Siniscalchi
Ivan Visconti
2016
TCC
Indistinguishability Obfuscation: From Approximate to Exact
Nir Bitansky
Vinod Vaikuntanathan
2016
TCC
Information-Theoretic Local Non-malleable Codes and Their Applications
Nishanth Chandran
Bhavana Kanukurthi
Srinivasan Raghuraman
2016
TCC
Interactive Coding for Interactive Proofs
Allison Bishop
Yevgeniy Dodis
2016
TCC
Interactive Oracle Proofs
Eli Ben-Sasson
Alessandro Chiesa
Nicholas Spooner
2016
TCC
Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
Ilan Komargodski
2016
TCC
Lower Bounds on Assumptions Behind Indistinguishability Obfuscation
Mohammad Mahmoody
Ameer Mohammed
Soheil Nematihaji
Rafael Pass
Abhi Shelat
2016
TCC
Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits
Yuval Ishai
Mor Weiss
Guang Yang
2016
TCC
More Efficient Constant-Round Multi-party Computation from BMR and SHE
Yehuda Lindell
Nigel P. Smart
Eduardo Soria-Vazquez
2016
TCC
Multi-key FHE from LWE, Revisited
Chris Peikert
Sina Shiehian
2016
TCC
Multilinear Maps from Obfuscation
Martin R. Albrecht
Pooya Farshim
Dennis Hofheinz
Enrique Larraia
Kenneth G. Paterson
2016
TCC
Non-Malleable Codes
★
Invited talk
Yevgeniy Dodis
2016
TCC
Non-Malleable Encryption: Simpler, Shorter, Stronger
Sandro Coretti
Yevgeniy Dodis
Björn Tackmann
Daniele Venturi
2016
TCC
Oblivious Parallel RAM and Applications
Elette Boyle
Kai-Min Chung
Rafael Pass
2016
TCC
Oblivious Parallel RAM: Improved Efficiency and Generic Constructions
Binyi Chen
Huijia Lin
Stefano Tessaro
2016
TCC
Oblivious Transfer from Any Non-trivial Elastic Noisy Channel via Secret Key Agreement
Ignacio Cascudo
Ivan Damgård
Felipe Lacerda
Samuel Ranellucci
2016
TCC
On Basing Private Information Retrieval on NP-Hardness
Tianren Liu
Vinod Vaikuntanathan
2016
TCC
On Constructing One-Way Permutations from Indistinguishability Obfuscation
Gilad Asharov
Gil Segev
2016
TCC
On the (In)Security of SNARKs in the Presence of Oracles
Dario Fiore
Anca Nitulescu
2016
TCC
On the Complexity of Additively Homomorphic UC Commitments
Tore Kasper Frederiksen
Thomas P. Jakobsen
Jesper Buus Nielsen
Roberto Trifiletti
2016
TCC
On the Correlation Intractability of Obfuscated Pseudorandom Functions
Ran Canetti
Yilei Chen
Leonid Reyzin
2016
TCC
On the Hardness of Learning with Rounding over Small Modulus
Andrej Bogdanov
Siyao Guo
Daniel Masny
Silas Richelson
Alon Rosen
2016
TCC
On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models
Mohammad Mahmoody
Ameer Mohammed
Soheil Nematihaji
2016
TCC
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM
Srinivas Devadas
Marten van Dijk
Christopher W. Fletcher
Ling Ren
Elaine Shi
Daniel Wichs
2016
TCC
Optimal Amplification of Noisy Leakages
Stefan Dziembowski
Sebastian Faust
Maciej Skórski
2016
TCC
Optimal Computational Split-state Non-malleable Codes
Divesh Aggarwal
Shashank Agrawal
Divya Gupta
Hemanta K. Maji
Omkant Pandey
Manoj Prabhakaran
2016
TCC
Order-Revealing Encryption and the Hardness of Private Learning
Mark Bun
Mark Zhandry
2016
TCC
Output-Compressing Randomized Encodings and Applications
Huijia Lin
Rafael Pass
Karn Seth
Sidharth Telang
2016
TCC
Perfect Structure on the Edge of Chaos - Trapdoor Permutations from Indistinguishability Obfuscation
Nir Bitansky
Omer Paneth
Daniel Wichs
2016
TCC
Perfectly Secure Message Transmission in Two Rounds
Gabriele Spini
Gilles Zémor
2016
TCC
Point-Function Obfuscation: A Framework and Generic Constructions
Mihir Bellare
Igors Stepanovs
2016
TCC
Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
Ehsan Ebrahimi Targhi
Dominique Unruh
2016
TCC
Proof of Space from Stacked Expanders
Ling Ren
Srinivas Devadas
2016
TCC
Pseudoentropy: Lower-Bounds for Chain Rules and Transformations
Krzysztof Pietrzak
Maciej Skórski
2016
TCC
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
Dennis Hofheinz
Tibor Jager
Andy Rupp
2016
TCC
Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs
Eli Ben-Sasson
Alessandro Chiesa
Ariel Gabizon
Madars Virza
2016
TCC
Rational Sumchecks
Siyao Guo
Pavel Hubácek
Alon Rosen
Margarita Vald
2016
TCC
Reconfigurable Cryptography: A Flexible Approach to Long-Term Security
Julia Hesse
Dennis Hofheinz
Andy Rupp
2016
TCC
Secure Hardware and Cryptography: Contrasts, Challenges and Opportunities
★
Invited talk
Srinivas Devadas
2016
TCC
Secure Multiparty RAM Computation in Constant Rounds
Sanjam Garg
Divya Gupta
Peihan Miao
Omkant Pandey
2016
TCC
Secure Obfuscation in a Weak Multilinear Map Model
Sanjam Garg
Eric Miles
Pratyay Mukherjee
Amit Sahai
Akshayaram Srinivasan
Mark Zhandry
2016
TCC
Semi-adaptive Security and Bundling Functionalities Made Generic and Easy
Rishab Goyal
Venkata Koppula
Brent Waters
2016
TCC
Separating Computational and Statistical Differential Privacy in the Client-Server Model
Mark Bun
Yi-Hsiu Chen
Salil P. Vadhan
2016
TCC
Simplified Universal Composability Framework
Douglas Wikström
2016
TCC
Simulating Auxiliary Inputs, Revisited
Maciej Skórski
2016
TCC
Simultaneous Secrecy and Reliability Amplification for a General Channel Model
Russell Impagliazzo
Ragesh Jaiswal
Valentine Kabanets
Bruce M. Kapron
Valerie King
Stefano Tessaro
2016
TCC
Single-Key to Multi-Key Functional Encryption with Polynomial Loss
Sanjam Garg
Akshayaram Srinivasan
2016
TCC
Standard Security Does Imply Security Against Selective Opening for Markov Distributions
Georg Fuchsbauer
Felix Heuer
Eike Kiltz
Krzysztof Pietrzak
2016
TCC
Standard Security Does Not Imply Indistinguishability Under Selective Opening
Dennis Hofheinz
Vanishree Rao
Daniel Wichs
2016
TCC
Strong Hardness of Privacy from Weak Traitor Tracing
Lucas Kowalczyk
Tal Malkin
Jonathan Ullman
Mark Zhandry
2016
TCC
Targeted Homomorphic Attribute-Based Encryption
Zvika Brakerski
David Cash
Rotem Tsabary
Hoeteck Wee
2016
TCC
The Complexity of Computing the Optimal Composition of Differential Privacy
Jack Murtagh
Salil P. Vadhan
2016
TCC
The GGM Function Family Is a Weakly One-Way Family of Functions
Aloni Cohen
Saleet Klein
2016
TCC
Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I
2016
TCC
Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II
2016
TCC
Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part I
2016
TCC
Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II
2016
TCC
Threshold Secret Sharing Requires a Linear Size Alphabet
Andrej Bogdanov
Siyao Guo
Ilan Komargodski
2016
TCC
Through the Looking Glass: What Cryptography Should Do for Alice
★
Invited talk
Allison Bishop
2016
TCC
Towards Non-Black-Box Separations of Public Key Encryption and One Way Function
Dana Dachman-Soled
2016
TCC
Two-Round Man-in-the-Middle Security from LPN
David Cash
Eike Kiltz
Stefano Tessaro
2016
TCC
Verifiable Random Functions from Standard Assumptions
Dennis Hofheinz
Tibor Jager
2016
TCC
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents
Shashank Agrawal
Manoj Prabhakaran
Ching-Hua Yu