Parallel Repetition |
An Efficient Parallel Repetition Theorem / Johan Håstad ; Rafael Pass ; Douglas Wikström ; Krzysztof Pietrzak |
Parallel Repetition Theorems for Interactive Arguments / Kai-Min Chung ; Feng-Hao Liu |
Almost Optimal Bounds for Direct Product Threshold Theorem / Charanjit S. Jutla |
Obfuscation |
On Symmetric Encryption and Point Obfuscation / Ran Canetti ; Yael Tauman Kalai ; Mayank Varia ; Daniel Wichs |
Obfuscation of Hyperplane Membership / Guy N. Rothblum |
Invited Talk |
Secure Computation and Its Diverse Applications / Yuval Ishai |
Multiparty Computation |
On Complete Primitives for Fairness / Dov Gordon ; Tal Moran ; Rafail Ostrovsky ; Amit Sahai |
On the Necessary and Sufficient Assumptions for UC Computation / Ivan Damgård ; Jesper Buus Nielsen ; Claudio Orlandi |
From Passive to Covert Security at Low Cost / Martin Geisler |
CCA Security |
A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems / Ronald Cramer ; Dennis Hofheinz ; Eike Kiltz |
Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs / Yevgeniy Vahlis |
Threshold Cryptography and Secret Sharing |
Efficient, Robust and Constant-Round Distributed RSA Key Generation / Gert Læssøe Mikkelsen |
Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems / Rikke Bendlin |
Ideal Hierarchical Secret Sharing Schemes / Oriol Farràs ; Carles Padró |
Symmetric Cryptography |
A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch / Ueli Maurer ; Stefano Tessaro |
On Related-Secret Pseudorandomness / David Goldenberg ; Moses Liskov |
A Domain Extender for the Ideal Cipher / Jean-Sébastian Coron ; Yevgeniy Dodis ; Avradip Mandal ; Yannick Seurin |
Delayed-Key Message Authentication for Streams / Marc Fischlin ; Anja Lehmann |
Key-Leakage and Tamper-Resistance |
Founding Cryptography on Tamper-Proof Hardware Tokens / Vipul Goyal ; Ramarathnam Venkatesan ; Akshay Wadia |
Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens / Vladimir Kolesnikov |
Leakage-Resilient Signatures / Sebastian Faust |
Public-Key Encryption Schemes with Auxiliary Inputs / Shafi Goldwasser ; Chris Peikert ; Vinod Vaikuntanathan |
Public-Key Cryptographic Primitives Provably as Secure as Subset Sum / Vadim Lyubashevsky ; Adriana Palacio ; Gil Segev |
Rationality and Privacy |
Rationality in the Full-Information Model / Ronen Gradwohl |
Efficient Rational Secret Sharing in Standard Communication Networks / Georg Fuchsbauer ; Jonathan Katz ; David Naccache |
Bounds on the Sample Complexity for Private Learning and Private Data Release / Amos Beimel ; Shiva Prasad Kasiviswanathan ; Kobbi Nissim |
Public-Key Encryption |
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts / Allison Lewko ; Brent Waters |
Robust Encryption / Michel Abdalla ; Mihir Bellare ; Gregory Neven |
Privacy-Enhancing Cryptography: From Theory into Practice / Jan Camenisch |
Zero-Knowledge |
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs / Benoît Libert ; Moti Yung |
Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing Model / Wei-Lung Dustin Tseng ; Muthuramakrishnan Venkitasubramaniam |
Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge / Omkant Pandey ; Ivan Visconti |
Efficiency Limitations for ?-Protocols for Group Homomorphisms / Endre Bangerter ; Stephan Krenn |
Composition of Zero-Knowledge Proofs with Efficient Provers / Eleanor Birrell ; Salil Vadhan |
Private Coins versus Public Coins in Zero-Knowledge Proof Systems |
Author Index |