Theory of Cryptography

11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings

  • Yehuda Lindell
Conference proceedings TCC 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8349)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Obfuscation

    1. Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai
      Pages 26-51
    2. Elette Boyle, Kai-Min Chung, Rafael Pass
      Pages 52-73
  3. Applications of Obfuscation

    1. Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova
      Pages 74-94
    2. Takahiro Matsuda, Goichiro Hanaoka
      Pages 95-120
  4. Zero Knowledge

    1. Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti
      Pages 167-191
    2. Kai-Min Chung, Rafail Ostrovsky, Rafael Pass, Muthuramakrishnan Venkitasubramaniam, Ivan Visconti
      Pages 192-216
  5. Black-Box Separations

    1. Dana Dachman-Soled, Mohammad Mahmoody, Tal Malkin
      Pages 217-239
    2. Mohammad Mahmoody, Hemanta K. Maji, Manoj Prabhakaran
      Pages 240-264
  6. Secure Computation

    1. Amos Beimel, Yuval Ishai, Ranjit Kumaresan, Eyal Kushilevitz
      Pages 317-342
    2. Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto
      Pages 343-367
    3. Carmit Hazay, Arpita Patra
      Pages 368-393
    4. Amos Beimel, Aner Ben-Efraim, Carles Padró, Ilya Tyomkin
      Pages 394-418
    5. Martin Hirt, Ueli Maurer, Pavel Raykov
      Pages 419-439
  7. Coding and Cryptographic Applications

    1. Mahdi Cheraghchi, Venkatesan Guruswami
      Pages 440-464
    2. Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi
      Pages 465-488
    3. Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky
      Pages 489-514
  8. Leakage

    1. Alexandra Berkoff, Feng-Hao Liu
      Pages 515-539
    2. Dana Dachman-Soled, Yael Tauman Kalai
      Pages 540-565
    3. Dimitar Jetchev, Krzysztof Pietrzak
      Pages 566-590
  9. Encryption

  10. Hardware-Aided Secure Protocols

    1. Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou
      Pages 638-662
    2. Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, Alon Rosen
      Pages 663-687
  11. Encryption and Signatures

    1. Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi
      Pages 688-712
    2. Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya
      Pages 713-738
  12. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. The 30 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box separations, secure computation, coding and cryptographic applications, leakage, encryption, hardware-aided secure protocols, and encryption and signatures.


coding theory malicious adversaries oblivious transfer public-key encryption verifiable random functions

Editors and affiliations

  • Yehuda Lindell
    • 1
  1. 1.Department of Computer ScienceBar-Ilan UniversityRamat GanIsrael

Bibliographic information

  • DOI
  • Copyright Information International Association for Cryptologic Research 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-54241-1
  • Online ISBN 978-3-642-54242-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site