Sciweavers

TCC
2016
Springer
40views Cryptology» more  TCC 2016»
8 years 7 months ago
Oblivious Parallel RAM and Applications
We initiate the study of cryptography for parallel RAM (PRAM) programs. The PRAM model captures modern multi-core architectures and cluster computing models, where several process...
Elette Boyle, Kai-Min Chung, Rafael Pass
TCC
2016
Springer
49views Cryptology» more  TCC 2016»
8 years 7 months ago
Functional Encryption for Turing Machines
Prabhanjan Vijendra Ananth, Amit Sahai
TCC
2016
Springer
47views Cryptology» more  TCC 2016»
8 years 7 months ago
Improved OR-Composition of Sigma-Protocols
In [CDS94] Cramer, Damg˚ard and Schoenmakers (CDS) devise an OR-composition technique for Σ-protocols that allows to construct highly-efficient proofs for compound statements. S...
Michele Ciampi, Giuseppe Persiano, Alessandra Scaf...
TCC
2016
Springer
42views Cryptology» more  TCC 2016»
8 years 7 months ago
Interactive Coding for Interactive Proofs
We consider interactive proof systems over adversarial communication channels. We show that the seminal result that IP = PSPACE still holds when the communication channel is malic...
Allison Bishop, Yevgeniy Dodis
TCC
2016
Springer
77views Cryptology» more  TCC 2016»
8 years 7 months ago
On the Complexity of Additively Homomorphic UC Commitments
We present a new constant round additively homomorphic commitment scheme with (amortized) computational and communication complexity linear in the size of the string committed to. ...
Tore Kasper Frederiksen, Thomas P. Jakobsen, Jespe...
TCC
2016
Springer
54views Cryptology» more  TCC 2016»
8 years 7 months ago
Multilinear Maps from Obfuscation
We provide constructions of multilinear groups equipped with natural hard problems from indistinguishability obfuscation, homomorphic encryption, and NIZKs. This complements known...
Martin R. Albrecht, Pooya Farshim, Dennis Hofheinz...
TCC
2016
Springer
38views Cryptology» more  TCC 2016»
8 years 7 months ago
Order-Revealing Encryption and the Hardness of Private Learning
An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compared to reveal the ordering of their underlying plaintexts. We show how to use or...
Mark Bun, Mark Zhandry
TCC
2016
Springer
64views Cryptology» more  TCC 2016»
8 years 7 months ago
Contention in Cryptoland: Obfuscation, Leakage and UCE
Mihir Bellare, Igors Stepanovs, Stefano Tessaro