© 2014

Theory of Cryptography

11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings

  • Yehuda Lindell
Conference proceedings TCC 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8349)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Obfuscation

    1. Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai
      Pages 26-51
    2. Elette Boyle, Kai-Min Chung, Rafael Pass
      Pages 52-73
  3. Applications of Obfuscation

    1. Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova
      Pages 74-94
    2. Takahiro Matsuda, Goichiro Hanaoka
      Pages 95-120
  4. Zero Knowledge

    1. Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti
      Pages 167-191
    2. Kai-Min Chung, Rafail Ostrovsky, Rafael Pass, Muthuramakrishnan Venkitasubramaniam, Ivan Visconti
      Pages 192-216
  5. Black-Box Separations

    1. Dana Dachman-Soled, Mohammad Mahmoody, Tal Malkin
      Pages 217-239
    2. Mohammad Mahmoody, Hemanta K. Maji, Manoj Prabhakaran
      Pages 240-264
  6. Secure Computation

    1. Amos Beimel, Yuval Ishai, Ranjit Kumaresan, Eyal Kushilevitz
      Pages 317-342
    2. Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto
      Pages 343-367
    3. Carmit Hazay, Arpita Patra
      Pages 368-393
    4. Amos Beimel, Aner Ben-Efraim, Carles Padró, Ilya Tyomkin
      Pages 394-418
    5. Martin Hirt, Ueli Maurer, Pavel Raykov
      Pages 419-439
  7. Coding and Cryptographic Applications

    1. Mahdi Cheraghchi, Venkatesan Guruswami
      Pages 440-464

About these proceedings


This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. The 30 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box separations, secure computation, coding and cryptographic applications, leakage, encryption, hardware-aided secure protocols, and encryption and signatures.


coding theory malicious adversaries oblivious transfer public-key encryption verifiable random functions

Editors and affiliations

  • Yehuda Lindell
    • 1
  1. 1.Department of Computer ScienceBar-Ilan UniversityRamat GanIsrael

Bibliographic information