List of Accepted Papers
Characterizing Complete Fairness in Secure Two-Party Computation Gilad Asharov Affiliations: Bar-Ilan University |
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki Okamoto Affiliations: NTT and Kogakuin University and NTT |
Probabilistically Checkable Proofs of Proximity with Zero-Knowledge Yuval Ishai and Mor Weiss Affiliations: Technion and Technion |
On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations Takahiro Matsuda Affiliations: RISEC, AIST, Japan |
One-Sided Adaptively Secure Two-Party Computation Carmit Hazay and Arpita Patra Affiliations: Bar-Ilan University and University of Bristol |
Dual System Encryption via Predicate Encodings Hoeteck Wee Affiliations: CNRS, ENS Paris |
Non-Malleable Coding Against Bit-wise and Split-State Tampering Mahdi Cheraghchi and Venkatesan Guruswami Affiliations: MIT and Carnegie Mellon University |
Locally Updatable and Locally Decodable Codes Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky Affiliations: AT&T Labs/Microsoft Research India and UCLA and UCLA |
Standard versus Selective Opening Security: Separation and Equivalence Results Dennis Hofheinz and Andy Rupp Affiliations: Karlsruhe Institute of Technology and Karlsruhe Institute of Technology |
Chosen Ciphertext Security via Point Obfuscation Takahiro Matsuda and Goichiro Hanaoka Affiliations: RISEC, AIST, Japan and RISEC, AIST, Japan |
Achieving Constant Round Leakage-Resilient Zero-Knowledge Omkant Pandey Affiliations: University of Illinois at Urbana-Champaign |
Broadcast Amplification Martin Hirt and Ueli Maurer and Pavel Raykov Affiliations: ETH Zürich and ETH Zürich and ETH Zürich |
Multi-Linear Secret Sharing Schemes Amos Beimel and Aner M Ben-Efraim and Carles Padró and Ilya Tomkin Affiliations: Ben-Gurion University and Ben-Gurion University and Nanyang Technological University and Ben-Gurion University |
How to Fake Auxiliary Input Dimitar Jetchev and Krzysztof Pietrzak Affiliations: EPFL, Lausanne, Switzerland and IST, Vienna, Austria |
Statistical Concurrent Non-Malleable Zero Knowledge Claudio Orlandi and Rafail Ostrovsky and Vanishree Rao and Amit Sahai and Ivan Visconti Affiliations: Aarhus University and UCLA and UCLA and UCLA and University of Salerno |
Leakage Resilient Fully Homomorphic Encryption Alexandra Berkoff and Feng-Hao Liu Affiliations: Brown University and University of Maryland |
Two-round secure MPC from Indistinguishability Obfuscation Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova Affiliations: IBM TJ Watson and IBM TJ Watson and IBM TJ Watson and IBM TJ Watson |
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding Zvika Brakerski and Guy N. Rothblum Affiliations: The Weizmann Institute and Microsoft Research |
On the Cryptographic Complexity of the Worst Functions Amos Beimel and Yuval Ishai and Ranjit Kumaresan and Eyal Kushilevitz Affiliations: Ben-Gurion University and Technion and Technion and Technion |
Universal, Minimal and Selectively Randomizable Structure-Preserving Signatures Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi Affiliations: NTT and UCL and NICT and NTT |
Securing Circuits and Protocols Against 1/poly(k) Tampering Rate Dana Dachman-Soled and Yael Tauman Kalai Affiliations: University of Maryland and Microsoft Research New England |
Continuous Non-malleable Codes Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi Affiliations: EFPL, Lausanne and Aarhus University and Aarhus University and Sapienza University |
Lower Bounds in the Hardware Token Model Shashank Agrawal and Prabhanjan Ananth and Vipul Goyal and Manoj Prabhakaranand Alon Rosen Affiliations: UIUC and UCLA and Microsoft Research India and UIUC and IDC Herzliya |
On The Impossibility of Structure-Preserving Deterministic Primitives Masayuki Abe and Jan Camenisch and Rafael Dowsley and Maria Dubovitskaya Affiliations: NTT Secure Platform Laboratories, Japan and IBM Research Zürich and Karlsruhe Institute of Technology and IBM Research Zürich/ETH Zürich |
Obfuscation for Evasive Functions Boaz Barak and Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth and Amit Sahai Affiliations: Microsoft Research and Tel Aviv University and Boston University/Tel Aviv University and Microsoft Research and Boston University and University of California Los Angeles |
On the Power of Public-key Encryption in Secure Computation Mohammad Mahmoody and Hemanta K Maji and Manoj Prabhakaran Affiliations: Cornell University and UCLA and UIUC |
Can Optimally-Fair Coin Tossing be Based on One-Way Functions? Dana Dachman-Soled and Mohammad Mahmoody and Tal Malkin Affiliations: University of Maryland and University of Virginia and Columbia University/Bar-Ilan University |
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens Seung Geol Choi and Jonathan Katz and Dominique Schröder and Arkady Yerukhimovich and Hong Sheng Zhou Affiliations: USNA and UMD and Saarland University and MIT Lincoln Laboratory and VCU |
4-Round Resettably-Sound Zero Knowledge Kai-Min Chung and Rafail Ostrovsky and Rafael Pass and Muthuramakrishnan Venkitasubramaniam and Ivan Visconti Affiliations: Academia Sinica and UCLA and Cornell University and University of Rochester and University of Salerno |
Extractable Obfuscation and Applications Elette Boyle and Kai-Min Chung and Rafael Pass Affiliations: Cornell NYC Tech and Academia Sinica and Cornell NYC Tech |