Secure Computation |
Computing on Authenticated Data / Jae Hyun Ahn ; Dan Boneh ; Jan Camenisch ; Susan Hohenberger ; abhi shelat ; Brent Waters |
Identifying Cheaters without an Honest Majority / Yuval Ishai ; Rafail Ostrovsky ; Hakan Seyalioglu |
On the Security of the "Free-XOR" Technique / Seung Geol Choi ; Jonathan Katz ; Ranjit Kumaresan ; Hong-Sheng Zhou |
Secure Two-Party Computation with Low Communication / Ivan Damgård ; Sebastian Faust ; Carmit Hazay |
(Blind) Signatures and Threshold Encryption |
Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions / Benoît Libert ; Moti Yung |
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions / Olivier Blazy ; David Pointcheval ; Damien Vergnaud |
On the Instantiability of Hash-and-Sign RSA Signatures / Yevgeniy Dodis ; Iftach Haitner ; Aris Tentes |
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures / Jae Hong Seo ; Jung Hee Cheon |
Zero-Knowledge and Security Models |
On Efficient Zero-Knowledge PCPs / Mohammad Mahmoody ; Amit Sahai |
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments / Helger Lipmaa |
Point Obfuscation and 3-Round Zero-Knowledge / Nir Bitansky ; Omer Paneth |
Confidentiality and Integrity: A Constructive Perspective / Ueli Maurer ; Andreas Rüedlinger ; Björn Tackmann |
Leakage-Resilience |
Leakage-Resilient Circuits without Computational Assumptions / Stefan Dziembowski |
A Parallel Repetition Theorem for Leakage Resilience / Zvika Brakerski ; Yael Tauman Kalai |
Leakage-Tolerant Interactive Protocols / Ran Canetti ; Shai Halevi |
Hash Functions |
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction / Avradip Mandal ; Jacques Patarin ; Yannick Seurin |
Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry / Dimitar Jetchev ; Onur Özen ; Martijn Stam |
Differential Privacy |
Lower Bounds in Differential Privacy / Anindya De |
Iterative Constructions and Private Data Release / Anupam Gupta ; Aaron Roth ; Jonathan Ullman |
Pseudorandomness I |
From Non-adaptive to Adaptive Pseudorandom Functions / Itay Berman |
Hardness Preserving Constructions of Pseudorandom Functions / Abhishek Jain ; Krzysztof Pietrzak |
Computational Extractors and Pseudorandomness / Dana Dachman-Soled ; Rosario Gennaro ; Hugo Krawczyk ; Tal Malkin |
Dedicated Encryption I |
Functional Re-encryption and Collusion-Resistant Obfuscation / Nishanth Chandran ; Melissa Chase ; Vinod Vaikuntanathan |
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption / Bryan Parno ; Mariana Raykova |
On Black-Box Reductions between Predicate Encryption Schemes / Vipul Goyal ; Virendra Kumar ; Satya Lokam |
Security Amplification |
Lossy Functions Do Not Amplify Well / Alon Rosen ; Gil Segev |
Counterexamples to Hardness Amplification beyond Negligible / Tal Moran ; Daniel Wichs |
Resettable and Parallel Zero Knowledge |
Resettable Statistical Zero Knowledge / Sanjam Garg ; Ivan Visconti ; Akshay Wadia |
The Knowledge Tightness of Parallel Zero-Knowledge / Kai-Min Chung ; Rafael Pass ; Wei-Lung Dustin Tseng |
Simultaneously Resettable Arguments of Knowledge / Chongwon Cho ; Alessandra Scafuro |
Dedicated Encryption II |
Subspace LWE |
Bounded-Collusion IBE from Key Homomorphism / Shafi Goldwasser ; Allison Lewko ; David A. Wilson |
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy / Benjamin Fuller ; Adam OÆNeill ; Leonid Reyzin |
Pseudorandomness II |
A Dichotomy for Local Small-Bias Generators / Benny Applebaum ; Andrej Bogdanov |
Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources / Thomas Ristenpart ; Salil Vadhan |
Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations / Dario Fiore ; Dominique Schröder |
Author Index |
Secure Computation |
Computing on Authenticated Data / Jae Hyun Ahn ; Dan Boneh ; Jan Camenisch ; Susan Hohenberger ; abhi shelat ; Brent Waters |
Identifying Cheaters without an Honest Majority / Yuval Ishai ; Rafail Ostrovsky ; Hakan Seyalioglu |
On the Security of the "Free-XOR" Technique / Seung Geol Choi ; Jonathan Katz ; Ranjit Kumaresan ; Hong-Sheng Zhou |
Secure Two-Party Computation with Low Communication / Ivan Damgård ; Sebastian Faust ; Carmit Hazay |
(Blind) Signatures and Threshold Encryption |