


default search action
22nd TCC 2024: Milan, Italy - Part IV
- Elette Boyle, Mohammad Mahmoody:
Theory of Cryptography - 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part IV. Lecture Notes in Computer Science 15367, Springer 2025, ISBN 978-3-031-78022-6
Obfuscation and Homomorphism
- Seyoon Ragavan
, Neekon Vafa
, Vinod Vaikuntanathan
:
Indistinguishability Obfuscation from Bilinear Maps and LPN Variants. 3-36 - Ran Canetti, Claudio Chamon, Eduardo R. Mucciolo, Andrei E. Ruckenstein:
Towards General-Purpose Program Obfuscation via Local Mixing. 37-70 - Pierre Meyer, Claudio Orlandi, Lawrence Roy, Peter Scholl:
Rate-1 Arithmetic Garbling From Homomorphic Secret Sharing. 71-97 - Giulio Malavolta:
Key-Homomorphic and Aggregate Verifiable Random Functions. 98-129 - Han Xia
, Feng-Hao Liu
, Han Wang
:
More Efficient Functional Bootstrapping for General Functions in Polynomial Modulus. 130-163
Multi-party Computation
- Pierre Charbit, Geoffroy Couteau, Pierre Meyer, Reza Naserasr:
A Note on Low-Communication Secure Multiparty Computation via Circuit Depth-Reduction. 167-199 - Konstantinos Brazitikos
, Vassilis Zikas
:
General Adversary Structures in Byzantine Agreement and Multi-party Computation with Active and Omission Corruption. 200-233 - Varun Narayanan
, Shubham Vivek Pawar, Akshayaram Srinivasan
:
Secure Computation with Parallel Calls to 2-Ary Functions. 234-265 - Ivan Damgård, Divya Ravi
, Lawrence Roy, Daniel Tschudi
, Sophia Yakoubov
:
Efficient Secure Communication over Dynamic Incomplete Networks with Minimal Connectivity. 266-292 - Nishanth Chandran, Juan A. Garay
, Ankit Kumar Misra
, Rafail Ostrovsky
, Vassilis Zikas
:
Adaptive Security, Erasures, and Network Assumptions in Communication-Local MPC. 293-326
Information-Theoretic Cryptography
- Yifan Song, Xiaxi Ye
:
Perfectly-Secure MPC with Constant Online Communication Complexity. 329-361 - Giovanni Deligios
, Anders Konring, Chen-Da Liu-Zhang
, Varun Narayanan
:
Statistical Layered MPC. 362-394 - Dustin Kasser:
An Improvement Upon the Bounds for the Local Leakage Resilience of Shamir's Secret Sharing Scheme. 395-422 - Jaspal Singh, Yu Wei, Vassilis Zikas:
Information-Theoretic Multi-server Private Information Retrieval with Client Preprocessing. 423-450 - Ittai Abraham
, Gilad Asharov
, Arpita Patra
, Gilad Stern
:
Asynchronous Agreement on a Core Set in Constant Expected Time and More Efficient Asynchronous VSS and MPC. 451-482
Secret Sharing
- Benny Applebaum
, Benny Pinkas
:
Distributing Keys and Random Secrets with Constant Complexity. 485-516 - Oriol Farràs
, Miquel Guiot
:
Reducing the Share Size of Weighted Threshold Secret Sharing Schemes via Chow Parameters Approximation. 517-547 - Bar Alon
, Amos Beimel
, Tamar Ben David
, Eran Omri
, Anat Paskin-Cherniavsky
:
New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs. 548-580 - Amos Beimel
, Oriol Farràs
, Or Lasri
, Oded Nir
:
Secret-Sharing Schemes for High Slices. 581-613 - Arka Rai Choudhuri
, Aarushi Goel
, Aditya Hegde
, Abhishek Jain
:
Homomorphic Secret Sharing with Verifiable Evaluation. 614-650

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.