Skip to main content
  • Conference proceedings
  • © 2020

Theory of Cryptography

18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part I

Editors:

(view affiliations)

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12550)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): TCC: Theory of Cryptography Conference

Conference proceedings info: TCC 2020.

Buying options

eBook
USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-64375-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD 109.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (24 papers)

  1. Front Matter

    Pages i-xvi
  2. Lossiness and Entropic Hardness for Ring-LWE

    • Zvika Brakerski, Nico Döttling
    Pages 1-27
  3. Multi-key Fully-Homomorphic Encryption in the Plain Model

    • Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta
    Pages 28-57
  4. Constant Ciphertext-Rate Non-committing Encryption from Standard Assumptions

    • Zvika Brakerski, Pedro Branco, Nico Döttling, Sanjam Garg, Giulio Malavolta
    Pages 58-87
  5. Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More

    • Sanjam Garg, Mohammad Hajiabadi, Rafail Ostrovsky
    Pages 88-116
  6. CP-ABE for Circuits (and More) in the Symmetric Key Setting

    • Shweta Agrawal, Shota Yamada
    Pages 117-148
  7. Optimal Broadcast Encryption from LWE and Pairings in the Standard Model

    • Shweta Agrawal, Daniel Wichs, Shota Yamada
    Pages 149-178
  8. On Perfect Correctness in (Lockable) Obfuscation

    • Rishab Goyal, Venkata Koppula, Satyanarayana Vusirikala, Brent Waters
    Pages 229-259
  9. Can a Public Blockchain Keep a Secret?

    • Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin et al.
    Pages 260-290
  10. Blockchains from Non-idealized Hash Functions

    • Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos
    Pages 291-321
  11. Ledger Combiners for Fast Settlement

    • Matthias Fitzi, Peter Gaži, Aggelos Kiayias, Alexander Russell
    Pages 322-352
  12. Asynchronous Byzantine Agreement with Subquadratic Communication

    • Erica Blum, Jonathan Katz, Chen-Da Liu-Zhang, Julian Loss
    Pages 353-380
  13. Expected Constant Round Byzantine Broadcast Under Dishonest Majority

    • Jun Wan, Hanshen Xiao, Elaine Shi, Srinivas Devadas
    Pages 381-411
  14. Round-Efficient Byzantine Broadcast Under Strongly Adaptive and Majority Corruptions

    • Jun Wan, Hanshen Xiao, Srinivas Devadas, Elaine Shi
    Pages 412-456
  15. A Lower Bound for One-Round Oblivious RAM

    • David Cash, Andrew Drucker, Alexander Hoover
    Pages 457-485
  16. Lower Bounds for Multi-server Oblivious RAMs

    • Kasper Green Larsen, Mark Simkin, Kevin Yeo
    Pages 486-503
  17. On Computational Shortcuts for Information-Theoretic PIR

    • Matthew M. Hong, Yuval Ishai, Victor I. Kolobov, Russell W. F. Lai
    Pages 504-534
  18. Characterizing Deterministic-Prover Zero Knowledge

    • Nir Bitansky, Arka Rai Choudhuri
    Pages 535-566

Other Volumes

  1. Theory of Cryptography

    18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part I
  2. Theory of Cryptography

    18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part II
  3. Theory of Cryptography

    18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III

About this book

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020.

The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography.

Due to the Corona pandemic this event was held virtually.

Keywords

  • architecting
  • artificial intelligence
  • authentication
  • ciphertexts
  • computer crime
  • computer systems
  • cryptography
  • data communication systems
  • data privacy
  • data security
  • distributed computer systems
  • distributed systems
  • encryption
  • network protocols
  • network security
  • privacy
  • public key cryptography
  • signal processing
  • software design
  • software engineering

Editors and Affiliations

  • Cornell Tech, New York, USA

    Rafael Pass

  • Institute of Science and Technology Austria, Klosterneuburg, Austria

    Krzysztof Pietrzak

Bibliographic Information

Buying options

eBook
USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-64375-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD 109.99
Price excludes VAT (USA)