<p>This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020.</p> <p>The total of 71 full papers presented in this three-volume set was carefully revie
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC, USA, November 16β19, 2020, Proceedings, Part I
β Scribed by Rafael Pass, Krzysztof Pietrzak
- Publisher
- Springer International Publishing;Springer
- Year
- 2020
- Tongue
- English
- Leaves
- 722
- Series
- Lecture Notes in Computer Science 12550
- Edition
- 1st ed.
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020.
The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography.
Due to the Corona pandemic this event was held virtually.
β¦ Table of Contents
Front Matter ....Pages i-xvi
Lossiness and Entropic Hardness for Ring-LWE (Zvika Brakerski, Nico DΓΆttling)....Pages 1-27
Multi-key Fully-Homomorphic Encryption in the Plain Model (Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta)....Pages 28-57
Constant Ciphertext-Rate Non-committing Encryption from Standard Assumptions (Zvika Brakerski, Pedro Branco, Nico DΓΆttling, Sanjam Garg, Giulio Malavolta)....Pages 58-87
Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More (Sanjam Garg, Mohammad Hajiabadi, Rafail Ostrovsky)....Pages 88-116
CP-ABE for Circuits (and More) in the Symmetric Key Setting (Shweta Agrawal, Shota Yamada)....Pages 117-148
Optimal Broadcast Encryption from LWE and Pairings in the Standard Model (Shweta Agrawal, Daniel Wichs, Shota Yamada)....Pages 149-178
Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark) (Ryo Nishimaki)....Pages 179-209
Functional Encryption for Quadratic Functions from k-Lin, Revisited (Hoeteck Wee)....Pages 210-228
On Perfect Correctness in (Lockable) Obfuscation (Rishab Goyal, Venkata Koppula, Satyanarayana Vusirikala, Brent Waters)....Pages 229-259
Can a Public Blockchain Keep a Secret? (Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin et al.)....Pages 260-290
Blockchains from Non-idealized Hash Functions (Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos)....Pages 291-321
Ledger Combiners for Fast Settlement (Matthias Fitzi, Peter GaΕΎi, Aggelos Kiayias, Alexander Russell)....Pages 322-352
Asynchronous Byzantine Agreement with Subquadratic Communication (Erica Blum, Jonathan Katz, Chen-Da Liu-Zhang, Julian Loss)....Pages 353-380
Expected Constant Round Byzantine Broadcast Under Dishonest Majority (Jun Wan, Hanshen Xiao, Elaine Shi, Srinivas Devadas)....Pages 381-411
Round-Efficient Byzantine Broadcast Under Strongly Adaptive and Majority Corruptions (Jun Wan, Hanshen Xiao, Srinivas Devadas, Elaine Shi)....Pages 412-456
A Lower Bound for One-Round Oblivious RAM (David Cash, Andrew Drucker, Alexander Hoover)....Pages 457-485
Lower Bounds for Multi-server Oblivious RAMs (Kasper Green Larsen, Mark Simkin, Kevin Yeo)....Pages 486-503
On Computational Shortcuts for Information-Theoretic PIR (Matthew M. Hong, Yuval Ishai, Victor I. Kolobov, Russell W. F. Lai)....Pages 504-534
Characterizing Deterministic-Prover Zero Knowledge (Nir Bitansky, Arka Rai Choudhuri)....Pages 535-566
NIZK from SNARG (Fuyuki Kitagawa, Takahiro Matsuda, Takashi Yamakawa)....Pages 567-595
Weakly Extractable One-Way Functions (Nir Bitansky, Noa Eizenstadt, Omer Paneth)....Pages 596-626
Towards Non-interactive Witness Hiding (Benjamin Kuykendall, Mark Zhandry)....Pages 627-656
FHE-Based Bootstrapping of Designated-Prover NIZK (Zvika Brakerski, Sanjam Garg, Rotem Tsabary)....Pages 657-683
Perfect Zero Knowledge: New Upperbounds and Relativized Separations (Peter Dixon, Sutanu Gayen, A. Pavan, N. V. Vinodchandran)....Pages 684-704
Back Matter ....Pages 705-707
β¦ Subjects
Computer Science; Coding and Information Theory; Computer Communication Networks
π SIMILAR VOLUMES
<p><p>This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020.</p><p>The total of 71 full papers presented in this three-volume set was carefully rev
<p><p>This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020.</p><p>The total of 71 full papers presented in this three-volume set was carefully rev