TCC 2011 Accepted Papers
| Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
|
Yehuda Lindell; Benny Pinkas
| (Nearly) Round-Optimal Black-Box Constructions of Commitments Secure Against Selective Opening Attacks
|
David Xiao
| Round-Optimal Password-Based Authenticated Key Exchange
|
Jonathan Katz; Vinod Vaikuntanathan
| Black-Box Circular-Secure Encryption Beyond Affine Functions
|
Zvika Brakerski; Shafi Goldwasser; Yael Tauman Kalai
| Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions
|
Daniel Kraschewski; Jörn Müller-Quade
| Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma
|
Stefano Tessaro
| Tight Bounds for Classical and Quantum Coin Flipping
|
Esther Hänggi; Jürg Wullschleger
| General Hardness Amplification of Predicates and Puzzles
|
Thomas Holenstein; Grant Schoenebeck
| A Zero-One Law for Secure Multi-Party Computation with Ternary Outputs
|
Gunnar Kreitz
| Identity-Based Encryption Secure Against Selective Opening Attack
|
Mihir Bellare; Brent Waters; Scott Yilek
| On the Complexity of Non-Adaptively Increasing the Stretch of Pseudorandom Generators
|
Eric Miles; Emanuele Viola
| Limits on the Stretch of Non-Adaptive Constructions of Pseudo-Random Generators
|
Josh Bronson; Ali Juma; Periklis A. Papakonstantinou
| Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions
|
Zvika Brakerski; Jonathan Katz; Gil Segev; Arkady Yerukhimovich
| Input Locality and Hardness Amplification
|
Andrej Bogdanov; Alon Rosen
| Perfectly Secure Oblivious RAM Without Random Oracles
|
Ivan Damgård; Sigurd Meldgaard; Jesper Buus Nielsen
| On the Impossibility of Blind Signatures From One-Way Permutations
|
Jonathan Katz; Dominique Schröder; Arkady Yerukhimovich
| Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token
|
Nico Döttling; Daniel Kraschewski; Jörn Müller-Quade
| Achieving Leakage Resilience Through Dual System Encryption
|
Allison Lewko; Yannis Rouselakis; Brent Waters
| Homomorphic Encryption: from Private-Key to Public-Key
|
Ron Rothblum
| On Black-Box Separations among Injective One-Way Functions
|
Takahiro Matsuda; Kanta Matsuura
| Parallel Repetition for Leakage Resilience Amplification Revisited
|
Abhishek Jain; Krzysztof Pietrzak
| Practical Adaptive Oblivious Transfer from Simple Assumptions
|
Matthew Green; Susan Hohenberger
| Limits of Computational Differential Privacy in the Client/Server Setting
|
Adam Groce; Jonathan Katz; Arkady Yerukhimovich
| On the Black-Box Complexity of Optimally-Fair Coin Tossing
|
Dana Dachman-Soled; Yehuda Lindell; Mohammad Mahmoody; Tal Malkin
| PCPs and the Hardness of Generating Synthetic Data
|
Jonathan Ullman; Salil Vadhan
| Functional Encryption: Definitions and Challenges
|
Dan Boneh; Amit Sahai; Brent Waters
| Correlated-Input Secure Hash Functions
|
Vipul Goyal; Adam O'Neill; Vanishree Rao
| After-the-Fact Leakage in Public-Key Encryption
|
Shai Halevi; Huijia Rachel Lin
| Signatures Resilient to Continual Leakage on Memory and Computation
|
Tal Malkin; Isamu Teranishi; Yevgeniy Vahlis; Moti Yung
| Bringing People of Different Beliefs Together to do UC
|
Sanjam Garg; Vipul Goyal; Abhishek Jain; Amit Sahai
| One-time Computable Self-Erasing Functions
|
Stefan Dziembowski; Tomasz Kazana; Daniel Wichs
| Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy
|
Johannes Gehrke; Edward Lui; Rafael Pass
| Exploring the Limits of Common Coins Using Frontier Analysis of Protocols
|
Hemanta K. Maji; Pichayoot Ouppaphan; Manoj Prabhakaran; Mike Rosulek
| Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs
|
Huijia Rachel Lin; Rafael Pass
| Towards Non-Black-Box Lower Bounds in Cryptography
|
Rafael Pass; Wei-Lung Dustin Tseng; Muthuramakrishnan Venkitasubramaniam
|