Skip to main content
  • Conference proceedings
  • © 2018

Theory of Cryptography

16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11239)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): TCC: Theory of Cryptography Conference

Conference proceedings info: TCC 2018.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

    Pages I-XVII
  2. Memory-Hard Functions and Complexity Theory

    1. Front Matter

      Pages 1-1
    2. Static-Memory-Hard Functions, and Modeling the Cost of Space vs. Time

      • Thaddeus Dryja, Quanquan C. Liu, Sunoo Park
      Pages 33-66
    3. No-signaling Linear PCPs

      • Susumu Kiyoshima
      Pages 67-97
    4. On Basing Search SIVP on NP-Hardness

      • Tianren Liu
      Pages 98-119
  3. Two-Round MPC Protocols

    1. Front Matter

      Pages 121-121
    2. Two-Round MPC: Information-Theoretic and Black-Box

      • Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
      Pages 123-151
    3. Perfect Secure Computation in Two Rounds

      • Benny Applebaum, Zvika Brakerski, Rotem Tsabary
      Pages 152-174
    4. Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions

      • Fabrice Benhamouda, Huijia Lin, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
      Pages 175-205
  4. Zero Knowledge

    1. Front Matter

      Pages 207-207
    2. One-Message Zero Knowledge and Non-malleable Commitments

      • Nir Bitansky, Huijia Lin
      Pages 209-234
    3. Smooth NIZK Arguments

      • Charanjit S. Jutla, Arnab Roy
      Pages 235-262
    4. Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations

      • Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
      Pages 263-285
    5. Round Optimal Black-Box “Commit-and-Prove”

      • Dakshita Khurana, Rafail Ostrovsky, Akshayaram Srinivasan
      Pages 286-313
  5. Information-Theoretic Cryptography

    1. Front Matter

      Pages 315-315
    2. Information-Theoretic Broadcast with Dishonest Majority for Long Messages

      • Wutichai Chongchitmate, Rafail Ostrovsky
      Pages 370-388
    3. Oblivious Transfer in Incomplete Networks

      • Varun Narayanan, Vinod M. Prabahakaran
      Pages 389-418

Other Volumes

  1. Theory of Cryptography

About this book

The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.

The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Editors and Affiliations

  • Ben Gurion University, Beer Sheva, Israel

    Amos Beimel

  • University of Warsaw, Warsaw, Poland

    Stefan Dziembowski

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access