Skip to main content
  • Conference proceedings
  • © 2014

Theory of Cryptography

11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8349)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): TCC: Theory of Cryptography Conference

Conference proceedings info: TCC 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (30 papers)

  1. Front Matter

    Pages I-XVI
  2. Obfuscation

    1. Obfuscation for Evasive Functions

      • Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai
      Pages 26-51
    2. On Extractability Obfuscation

      • Elette Boyle, Kai-Min Chung, Rafael Pass
      Pages 52-73
  3. Applications of Obfuscation

    1. Two-Round Secure MPC from Indistinguishability Obfuscation

      • Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova
      Pages 74-94
    2. Chosen Ciphertext Security via Point Obfuscation

      • Takahiro Matsuda, Goichiro Hanaoka
      Pages 95-120
  4. Zero Knowledge

    1. Statistical Concurrent Non-malleable Zero Knowledge

      • Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti
      Pages 167-191
    2. 4-Round Resettably-Sound Zero Knowledge

      • Kai-Min Chung, Rafail Ostrovsky, Rafael Pass, Muthuramakrishnan Venkitasubramaniam, Ivan Visconti
      Pages 192-216
  5. Black-Box Separations

    1. Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?

      • Dana Dachman-Soled, Mohammad Mahmoody, Tal Malkin
      Pages 217-239
    2. On the Power of Public-Key Encryption in Secure Computation

      • Mohammad Mahmoody, Hemanta K. Maji, Manoj Prabhakaran
      Pages 240-264
  6. Secure Computation

    1. On the Cryptographic Complexity of the Worst Functions

      • Amos Beimel, Yuval Ishai, Ranjit Kumaresan, Eyal Kushilevitz
      Pages 317-342
    2. Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol

      • Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto
      Pages 343-367
    3. One-Sided Adaptively Secure Two-Party Computation

      • Carmit Hazay, Arpita Patra
      Pages 368-393
    4. Multi-linear Secret-Sharing Schemes

      • Amos Beimel, Aner Ben-Efraim, Carles Padró, Ilya Tyomkin
      Pages 394-418
    5. Broadcast Amplification

      • Martin Hirt, Ueli Maurer, Pavel Raykov
      Pages 419-439
  7. Coding and Cryptographic Applications

    1. Non-malleable Coding against Bit-Wise and Split-State Tampering

      • Mahdi Cheraghchi, Venkatesan Guruswami
      Pages 440-464

Other Volumes

  1. Theory of Cryptography

About this book

This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. The 30 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box separations, secure computation, coding and cryptographic applications, leakage, encryption, hardware-aided secure protocols, and encryption and signatures.

Editors and Affiliations

  • Department of Computer Science, Bar-Ilan University, Ramat Gan, Israel

    Yehuda Lindell

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access