Sciweavers

122
Voted
TCC
2016
Springer
42views Cryptology» more  TCC 2016»
10 years 18 days ago
Interactive Coding for Interactive Proofs
We consider interactive proof systems over adversarial communication channels. We show that the seminal result that IP = PSPACE still holds when the communication channel is malic...
Allison Bishop, Yevgeniy Dodis
TCC
2016
Springer
77views Cryptology» more  TCC 2016»
10 years 18 days ago
On the Complexity of Additively Homomorphic UC Commitments
We present a new constant round additively homomorphic commitment scheme with (amortized) computational and communication complexity linear in the size of the string committed to. ...
Tore Kasper Frederiksen, Thomas P. Jakobsen, Jespe...
TCC
2016
Springer
54views Cryptology» more  TCC 2016»
10 years 18 days ago
Multilinear Maps from Obfuscation
We provide constructions of multilinear groups equipped with natural hard problems from indistinguishability obfuscation, homomorphic encryption, and NIZKs. This complements known...
Martin R. Albrecht, Pooya Farshim, Dennis Hofheinz...
TCC
2016
Springer
38views Cryptology» more  TCC 2016»
10 years 18 days ago
Order-Revealing Encryption and the Hardness of Private Learning
An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compared to reveal the ordering of their underlying plaintexts. We show how to use or...
Mark Bun, Mark Zhandry
TCC
2016
Springer
64views Cryptology» more  TCC 2016»
10 years 18 days ago
Point-Function Obfuscation: A Framework and Generic Constructions
Mihir Bellare, Igors Stepanovs
111
Voted
TCC
2016
Springer
64views Cryptology» more  TCC 2016»
10 years 18 days ago
Contention in Cryptoland: Obfuscation, Leakage and UCE
Mihir Bellare, Igors Stepanovs, Stefano Tessaro
TCC
2016
Springer
50views Cryptology» more  TCC 2016»
10 years 18 days ago
Rational Sumchecks
Rational proofs, introduced by Azar and Micali (STOC 2012) are a variant of interactive proofs in which the prover is neither honest nor malicious, but rather rational. The advanta...
Siyao Guo, Pavel Hubácek, Alon Rosen, Marga...
111
Voted
TCC
2016
Springer
49views Cryptology» more  TCC 2016»
10 years 18 days ago
On Constructing One-Way Permutations from Indistinguishability Obfuscation
Gilad Asharov, Gil Segev