Skip to main content
  • Conference proceedings
  • © 2020

Theory of Cryptography

18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part II

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12551)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): TCC: Theory of Cryptography Conference

Conference proceedings info: TCC 2020.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, access via your institution.

Table of contents (24 papers)

  1. Front Matter

    Pages i-xii
  2. Recursive Proof Composition from Accumulation Schemes

    • Benedikt Bünz, Alessandro Chiesa, Pratyush Mishra, Nicholas Spooner
    Pages 1-18
  3. Linear-Time Arguments with Sublinear Verification from Tensor Codes

    • Jonathan Bootle, Alessandro Chiesa, Jens Groth
    Pages 19-46
  4. Barriers for Succinct Arguments in the Random Oracle Model

    • Alessandro Chiesa, Eylon Yogev
    Pages 47-76
  5. Batch Verification and Proofs of Proximity with Polylog Overhead

    • Guy N. Rothblum, Ron D. Rothblum
    Pages 108-138
  6. Batch Verification for Statistical Zero Knowledge Proofs

    • Inbar Kaslasi, Guy N. Rothblum, Ron D. Rothblum, Adam Sealfon, Prashant Nalini Vasudevan
    Pages 139-167
  7. Public-Coin Zero-Knowledge Arguments with (almost) Minimal Time and Space Overheads

    • Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, Pratik Soni
    Pages 168-197
  8. On the Price of Concurrency in Group Ratcheting Protocols

    • Alexander Bienstock, Yevgeniy Dodis, Paul Rösler
    Pages 198-228
  9. Stronger Security and Constructions of Multi-designated Verifier Signatures

    • Ivan Damgård, Helene Haagh, Rebekah Mercer, Anca Nitulescu, Claudio Orlandi, Sophia Yakoubov
    Pages 229-260
  10. Continuous Group Key Agreement with Active Security

    • Joël Alwen, Sandro Coretti, Daniel Jost, Marta Mularczyk
    Pages 261-290
  11. Round Optimal Secure Multiparty Computation from Minimal Assumptions

    • Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
    Pages 291-319
  12. Reusable Two-Round MPC from DDH

    • James Bartusek, Sanjam Garg, Daniel Masny, Pratyay Mukherjee
    Pages 320-348
  13. Mr NISC: Multiparty Reusable Non-Interactive Secure Computation

    • Fabrice Benhamouda, Huijia Lin
    Pages 349-378
  14. Secure Massively Parallel Computation for Dishonest Majority

    • Rex Fernando, Ilan Komargodski, Yanyi Liu, Elaine Shi
    Pages 379-409
  15. Towards Multiparty Computation Withstanding Coercion of All Parties

    • Ran Canetti, Oxana Poburinnaya
    Pages 410-438
  16. Synchronous Constructive Cryptography

    • Chen-Da Liu-Zhang, Ueli Maurer
    Pages 439-472
  17. Topology-Hiding Communication from Minimal Assumptions

    • Marshall Ball, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin, Pierre Meyer et al.
    Pages 473-501
  18. On Statistical Security in Two-Party Computation

    • Dakshita Khurana, Muhammad Haris Mughees
    Pages 532-561

Other Volumes

About this book

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020.

The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography.

Due to the Corona pandemic this event was held virtually.

Keywords

  • authentication
  • communication
  • communication protocols
  • computer security
  • computer systems
  • cryptography
  • data communication systems
  • data mining
  • data security
  • distributed computer systems
  • information theory
  • network protocols
  • network security
  • privacy
  • privacy preserving
  • public key cryptography
  • secure multi-party computation
  • software design
  • telecommunication networks
  • telecommunication systems

Editors and Affiliations

  • Cornell Tech, New York, USA

    Rafael Pass

  • Institute of Science and Technology Austria, Klosterneuburg, Austria

    Krzysztof Pietrzak

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access