Theory of Cryptography

11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings

Editors:

ISBN: 978-3-642-54241-1 (Print) 978-3-642-54242-8 (Online)

Table of contents (30 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XVI

  2. Obfuscation

    1. No Access

      Book Chapter

      Pages 1-25

      Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding

    2. No Access

      Book Chapter

      Pages 26-51

      Obfuscation for Evasive Functions

    3. No Access

      Book Chapter

      Pages 52-73

      On Extractability Obfuscation

  3. Applications of Obfuscation

    1. No Access

      Book Chapter

      Pages 74-94

      Two-Round Secure MPC from Indistinguishability Obfuscation

    2. No Access

      Book Chapter

      Pages 95-120

      Chosen Ciphertext Security via Point Obfuscation

  4. Zero Knowledge

    1. No Access

      Book Chapter

      Pages 121-145

      Probabilistically Checkable Proofs of Proximity with Zero-Knowledge

    2. No Access

      Book Chapter

      Pages 146-166

      Achieving Constant Round Leakage-Resilient Zero-Knowledge

    3. No Access

      Book Chapter

      Pages 167-191

      Statistical Concurrent Non-malleable Zero Knowledge

    4. No Access

      Book Chapter

      Pages 192-216

      4-Round Resettably-Sound Zero Knowledge

  5. Black-Box Separations

    1. No Access

      Book Chapter

      Pages 217-239

      Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?

    2. No Access

      Book Chapter

      Pages 240-264

      On the Power of Public-Key Encryption in Secure Computation

    3. No Access

      Book Chapter

      Pages 265-290

      On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations

  6. Secure Computation

    1. No Access

      Book Chapter

      Pages 291-316

      Towards Characterizing Complete Fairness in Secure Two-Party Computation

    2. No Access

      Book Chapter

      Pages 317-342

      On the Cryptographic Complexity of the Worst Functions

    3. No Access

      Book Chapter

      Pages 343-367

      Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol

    4. No Access

      Book Chapter

      Pages 368-393

      One-Sided Adaptively Secure Two-Party Computation

    5. No Access

      Book Chapter

      Pages 394-418

      Multi-linear Secret-Sharing Schemes

    6. No Access

      Book Chapter

      Pages 419-439

      Broadcast Amplification

  7. Coding and Cryptographic Applications

    1. No Access

      Book Chapter

      Pages 440-464

      Non-malleable Coding against Bit-Wise and Split-State Tampering

    2. No Access

      Book Chapter

      Pages 465-488

      Continuous Non-malleable Codes

previous Page of 2