default search action
22nd TCC 2024: Milan, Italy - Part IV
- Elette Boyle, Mohammad Mahmoody:
Theory of Cryptography - 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part IV. Lecture Notes in Computer Science 15367, Springer 2025, ISBN 978-3-031-78022-6
Obfuscation and Homomorphism
- Seyoon Ragavan, Neekon Vafa, Vinod Vaikuntanathan:
Indistinguishability Obfuscation from Bilinear Maps and LPN Variants. 3-36 - Ran Canetti, Claudio Chamon, Eduardo R. Mucciolo, Andrei E. Ruckenstein:
Towards General-Purpose Program Obfuscation via Local Mixing. 37-70 - Pierre Meyer, Claudio Orlandi, Lawrence Roy, Peter Scholl:
Rate-1 Arithmetic Garbling From Homomorphic Secret Sharing. 71-97 - Giulio Malavolta:
Key-Homomorphic and Aggregate Verifiable Random Functions. 98-129 - Han Xia, Feng-Hao Liu, Han Wang:
More Efficient Functional Bootstrapping for General Functions in Polynomial Modulus. 130-163
Multi-party Computation
- Pierre Charbit, Geoffroy Couteau, Pierre Meyer, Reza Naserasr:
A Note on Low-Communication Secure Multiparty Computation via Circuit Depth-Reduction. 167-199 - Konstantinos Brazitikos, Vassilis Zikas:
General Adversary Structures in Byzantine Agreement and Multi-party Computation with Active and Omission Corruption. 200-233 - Varun Narayanan, Shubham Vivek Pawar, Akshayaram Srinivasan:
Secure Computation with Parallel Calls to 2-Ary Functions. 234-265 - Ivan Damgård, Divya Ravi, Lawrence Roy, Daniel Tschudi, Sophia Yakoubov:
Efficient Secure Communication over Dynamic Incomplete Networks with Minimal Connectivity. 266-292 - Nishanth Chandran, Juan A. Garay, Ankit Kumar Misra, Rafail Ostrovsky, Vassilis Zikas:
Adaptive Security, Erasures, and Network Assumptions in Communication-Local MPC. 293-326
Information-Theoretic Cryptography
- Yifan Song, Xiaxi Ye:
Perfectly-Secure MPC with Constant Online Communication Complexity. 329-361 - Giovanni Deligios, Anders Konring, Chen-Da Liu-Zhang, Varun Narayanan:
Statistical Layered MPC. 362-394 - Dustin Kasser:
An Improvement Upon the Bounds for the Local Leakage Resilience of Shamir's Secret Sharing Scheme. 395-422 - Jaspal Singh, Yu Wei, Vassilis Zikas:
Information-Theoretic Multi-server Private Information Retrieval with Client Preprocessing. 423-450 - Ittai Abraham, Gilad Asharov, Arpita Patra, Gilad Stern:
Asynchronous Agreement on a Core Set in Constant Expected Time and More Efficient Asynchronous VSS and MPC. 451-482
Secret Sharing
- Benny Applebaum, Benny Pinkas:
Distributing Keys and Random Secrets with Constant Complexity. 485-516 - Oriol Farràs, Miquel Guiot:
Reducing the Share Size of Weighted Threshold Secret Sharing Schemes via Chow Parameters Approximation. 517-547 - Bar Alon, Amos Beimel, Tamar Ben David, Eran Omri, Anat Paskin-Cherniavsky:
New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs. 548-580 - Amos Beimel, Oriol Farràs, Or Lasri, Oded Nir:
Secret-Sharing Schemes for High Slices. 581-613 - Arka Rai Choudhuri, Aarushi Goel, Aditya Hegde, Abhishek Jain:
Homomorphic Secret Sharing with Verifiable Evaluation. 614-650
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.