TCC 2016-B: Accepted Papers
Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
Jeremiah Blocki, Hong-Sheng Zhou
Fast Pseudorandom Functions Based on Expander Graphs
Benny Applebaum, Pavel Raykov
More Efficient Constant-Round Multi-Party Computation from BMR and SHE
Yehuda Lindell, Nigel P. Smart, Eduardo Soria-Vazquez
Perfectly Secure Message Transmission in Two Rounds
Gabriele Spini, Gilles Zémor
Simultaneous Secrecy and Reliability Amplification for a General Channel Model
Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets, Bruce M. Kapron, Valerie King, Stefano Tessaro
Binary AMD Circuits from Secure Multiparty Computation
Daniel Genkin, Yuval Ishai, Mor Weiss
Standard Security Does Not Imply Indistinguishability Under Selective Opening
Dennis Hofheinz, Vanishree Rao, Daniel Wichs
Single-Key to Multi-Key Functional Encryption with Polynomial Loss
Sanjam Garg, Akshayaram Srinivasan
Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
Rishab Goyal, Venkata Koppula, Brent Waters
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
Dennis Hofheinz, Tibor Jager, Andy Rupp
Proof of Space from Stacked Expanders
Ling Ren, Srinivas Devadas
Threshold Secret Sharing Requires a Linear Size Alphabet
Andrej Bogdanov, Siyao Guo, Ilan Komargodski
Oblivious Transfer from Any Non-Trivial Elastic Noisy Channel via Secret Key Agreement
Ignacio Cascudo, Ivan Damgård, Felipe Lacerda, Samuel Ranellucci
Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
Ilan Komargodski
Access Control Encryption: Enforcing Information Flow with Cryptography
Ivan Damgård, Helene Haagh, Claudio Orlandi
How to Share a Secret, Infinitely
Ilan Komargodski, Moni Naor, Eylon Yogev
Strong Hardness of Privacy from Weak Traitor Tracing
Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, Mark Zhandry
On the (In)security of SNARKs in the Presence of Oracles
Dario Fiore, Anca Nitulescu
Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
Ehsan Ebrahimi Targhi, Dominique Unruh
Towards Non-Black-Box Separations of Public Key Encryption and One Way Function
Dana Dachman-Soled
3-Message Zero Knowledge Against Human Ignorance
Nir Bitansky, Zvika Brakerski, Yael Kalai, Omer Paneth, Vinod Vaikuntanathan
Interactive Oracle Proofs
Eli Ben-Sasson, Alessandro Chiesa, Nicholas Spooner
Multi-Key FHE from LWE, Revisited
Chris Peikert, Sina Shiehian
The GGM Function Family is a Weakly One-Way Family of Functions
Aloni Cohen, Saleet Klein
Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious
Bar Alon, Eran Omri
Adaptive Security of Yao's Garbled Circuits
Zahra Jafargholi, Daniel Wichs
Compactness vs Collusion Resistance in Functional Encryption
Baiyu Li, Daniele Micciancio
Delegating RAM Computations
Yael Kalai, Omer Paneth
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
Carmit Hazay, Avishay Yanai
Adaptive Succinct Garbled RAM, or How To Delegate Your Database
Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
Mark Bun, Thomas Steinke
Separating Computational and Statistical Differential Privacy in the Client-Server Model
Mark Bun, Yi-Hsiu Chen, Salil P. Vadhan
Targeted Homomorphic Attribute-Based Encryption
Zvika Brakerski, David Cash, Rotem Tsabary, Hoeteck Wee
Cross&Clean: Amortized Garbled Circuits With Constant Overhead
Jesper Buus Nielsen, Claudio Orlandi
Efficient Secure Multiparty Computation with Identifiable Abort
Carsten Baum, Emmanuela Orsini, Peter Scholl
Composable Adaptive Secure Protocols without Setup under Polytime Assumptions
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
From Cryptomania to Obfustopia through Secret-Key Functional Encryption
Nir Bitansky, Ryo Nishimaki, Alain Passelègue, Daniel Wichs
Secure Obfuscation in a Weak Multilinear Map Model
Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry
Composable Security in the Tamper-Proof Hardware Model under Minimal Complexity
Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
Simulating Auxiliary Inputs, Revisited
Maciej Skorski
Pseudoentropy: Lower-bounds for Chain rules and Transformations
Krzysztof Pietrzak, Maciej Skorski
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents
Shashank Agrawal, Manoj Prabhakaran, Ching-Hua Yu
Delegating RAM Computations with Adaptive Soundness and Privacy
Prabhanjan Ananth, Yu-Chi Chen, Kai-Min Chung, Huijia Lin, Wei-Kai Lin
Secure Multiparty RAM Computation in Constant Rounds
Sanjam Garg, Divya Gupta, Peihan Miao, Omkant Pandey
Deniable Attribute Based Encryption for Branching Programs from LWE
Daniel Apon, Xiong Fan, Feng-Hao Liu