Skip to main content
  • Conference proceedings
  • © 2020

Theory of Cryptography

18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12552)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): TCC: Theory of Cryptography Conference

Conference proceedings info: TCC 2020.

Buying options

eBook USD 109.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-64381-2
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 139.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (23 papers)

  1. Front Matter

    Pages i-xii
  2. Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC

    • Christian Badertscher, Ran Canetti, Julia Hesse, Björn Tackmann, Vassilis Zikas
    Pages 1-30
  3. Quantum Encryption with Certified Deletion

    • Anne Broadbent, Rabib Islam
    Pages 92-122
  4. Secure Quantum Extraction Protocols

    • Prabhanjan Ananth, Rolando L. La Placa
    Pages 123-152
  5. Non-interactive Classical Verification of Quantum Computation

    • Gorjan Alagic, Andrew M. Childs, Alex B. Grilo, Shih-Han Hung
    Pages 153-180
  6. Classical Verification of Quantum Computations with Efficient Verifier

    • Nai-Hui Chia, Kai-Min Chung, Takashi Yamakawa
    Pages 181-206
  7. Coupling of Random Systems

    • David Lanzenberger, Ueli Maurer
    Pages 207-240
  8. Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity

    • Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri, Stefano Tessaro
    Pages 241-273
  9. Zero-Communication Reductions

    • Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran
    Pages 274-304
  10. Lower Bounds on the Time/Memory Tradeoff of Function Inversion

    • Dror Chawin, Iftach Haitner, Noam Mazor
    Pages 305-334
  11. Super-Linear Time-Memory Trade-Offs for Symmetric Encryption

    • Wei Dai, Stefano Tessaro, Xihu Zhang
    Pages 335-365
  12. On the Security of Time-Lock Puzzles and Timed Commitments

    • Jonathan Katz, Julian Loss, Jiayu Xu
    Pages 390-413
  13. On the Complexity of Arithmetic Secret Sharing

    • Ronald Cramer, Chaoping Xing, Chen Yuan
    Pages 444-469
  14. Transparent Error Correcting in a Computationally Bounded World

    • Ofer Grossman, Justin Holmgren, Eylon Yogev
    Pages 530-549

Other Volumes

  1. Theory of Cryptography

    18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part I
  2. Theory of Cryptography

    18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part II
  3. Theory of Cryptography

    18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III

About this book

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020.

The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography.

 

Due to the Corona pandemic this event was held virtually.

Keywords

  • authentication
  • communication
  • computer security
  • computer systems
  • cryptography
  • data privacy
  • data security
  • electronic document identification systems
  • encryption
  • hash functions
  • mathematics
  • network security
  • privacy
  • public key cryptography
  • public-key encryption
  • random oracle
  • random oracle model
  • software design
  • software engineering
  • telecommunication systems

Editors and Affiliations

  • Cornell Tech, New York, USA

    Rafael Pass

  • Institute of Science and Technology Austria, Klosterneuburg, Austria

    Krzysztof Pietrzak

Bibliographic Information

Buying options

eBook USD 109.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-64381-2
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 139.99
Price excludes VAT (USA)