𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III

✍ Scribed by Rafael Pass, Krzysztof Pietrzak


Publisher
Springer International Publishing;Springer
Year
2020
Tongue
English
Leaves
683
Series
Lecture Notes in Computer Science 12552
Edition
1st ed.
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020.

The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography.

Due to the Corona pandemic this event was held virtually.

✦ Table of Contents


Front Matter ....Pages i-xii
Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC (Christian Badertscher, Ran Canetti, Julia Hesse, BjΓΆrn Tackmann, Vassilis Zikas)....Pages 1-30
Security Analysis of (\textit{SPAKE2}+) (Victor Shoup)....Pages 31-60
SchrΓΆdinger’s Pirate: How to Trace a Quantum Decoder (Mark Zhandry)....Pages 61-91
Quantum Encryption with Certified Deletion (Anne Broadbent, Rabib Islam)....Pages 92-122
Secure Quantum Extraction Protocols (Prabhanjan Ananth, Rolando L. La Placa)....Pages 123-152
Non-interactive Classical Verification of Quantum Computation (Gorjan Alagic, Andrew M. Childs, Alex B. Grilo, Shih-Han Hung)....Pages 153-180
Classical Verification of Quantum Computations with Efficient Verifier (Nai-Hui Chia, Kai-Min Chung, Takashi Yamakawa)....Pages 181-206
Coupling of Random Systems (David Lanzenberger, Ueli Maurer)....Pages 207-240
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity (Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri, Stefano Tessaro)....Pages 241-273
Zero-Communication Reductions (Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran)....Pages 274-304
Lower Bounds on the Time/Memory Tradeoff of Function Inversion (Dror Chawin, Iftach Haitner, Noam Mazor)....Pages 305-334
Super-Linear Time-Memory Trade-Offs for Symmetric Encryption (Wei Dai, Stefano Tessaro, Xihu Zhang)....Pages 335-365
Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions (Lior Rotem, Gil Segev)....Pages 366-389
On the Security of Time-Lock Puzzles and Timed Commitments (Jonathan Katz, Julian Loss, Jiayu Xu)....Pages 390-413
Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness (Joseph Jaeger, Stefano Tessaro)....Pages 414-443
On the Complexity of Arithmetic Secret Sharing (Ronald Cramer, Chaoping Xing, Chen Yuan)....Pages 444-469
Robust Secret Sharing with Almost Optimal Share Size and Security Against Rushing Adversaries (Serge Fehr, Chen Yuan)....Pages 470-498
The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs (Amos Beimel, Oriol Farr`s)....Pages 499-529
Transparent Error Correcting in a Computationally Bounded World (Ofer Grossman, Justin Holmgren, Eylon Yogev)....Pages 530-549
New Techniques in Replica Encodings with Client Setup (Rachit Garg, George Lu, Brent Waters)....Pages 550-583
Non-malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering (Eshan Chattopadhyay, Xin Li)....Pages 584-613
On Average-Case Hardness in (\mathsf {TFNP}) from One-Way Functions (Pavel HubÑček, Chethan Kamath, Karel KrÑl, Veronika SlívovÑ)....Pages 614-638
On Pseudorandom Encodings (Thomas Agrikola, Geoffroy Couteau, Yuval Ishai, StanisΕ‚aw Jarecki, Amit Sahai)....Pages 639-669
Back Matter ....Pages 671-673

✦ Subjects


Computer Science; Information Systems Applications (incl.Internet); Computer Communication Networks; Computer System Implementation


πŸ“œ SIMILAR VOLUMES


Theory of Cryptography: 18th Internation
✍ Rafael Pass, Krzysztof Pietrzak πŸ“‚ Library πŸ“… 2020 πŸ› Springer 🌐 English

<p>This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020.</p> <p>The total of 71 full papers presented in this three-volume set was carefully revie

Theory of Cryptography: 18th Internation
✍ Rafael Pass, Krzysztof Pietrzak πŸ“‚ Library πŸ“… 2020 πŸ› Springer International Publishing;Springer 🌐 English

<p><p>This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020.</p><p>The total of 71 full papers presented in this three-volume set was carefully rev

Theory of Cryptography: 18th Internation
✍ Rafael Pass, Krzysztof Pietrzak πŸ“‚ Library πŸ“… 2020 πŸ› Springer International Publishing;Springer 🌐 English

<p><p>This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020.</p><p>The total of 71 full papers presented in this three-volume set was carefully rev