


default search action
22nd TCC 2024: Milan, Italy - Part IV
- Elette Boyle, Mohammad Mahmoody:

Theory of Cryptography - 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part IV. Lecture Notes in Computer Science 15367, Springer 2025, ISBN 978-3-031-78022-6
Obfuscation and Homomorphism
- Seyoon Ragavan

, Neekon Vafa
, Vinod Vaikuntanathan
:
Indistinguishability Obfuscation from Bilinear Maps and LPN Variants. 3-36 - Ran Canetti, Claudio Chamon, Eduardo R. Mucciolo, Andrei E. Ruckenstein:

Towards General-Purpose Program Obfuscation via Local Mixing. 37-70 - Pierre Meyer

, Claudio Orlandi, Lawrence Roy, Peter Scholl:
Rate-1 Arithmetic Garbling From Homomorphic Secret Sharing. 71-97 - Giulio Malavolta:

Key-Homomorphic and Aggregate Verifiable Random Functions. 98-129 - Han Xia

, Feng-Hao Liu
, Han Wang
:
More Efficient Functional Bootstrapping for General Functions in Polynomial Modulus. 130-163
Multi-party Computation
- Pierre Charbit, Geoffroy Couteau, Pierre Meyer

, Reza Naserasr:
A Note on Low-Communication Secure Multiparty Computation via Circuit Depth-Reduction. 167-199 - Konstantinos Brazitikos

, Vassilis Zikas
:
General Adversary Structures in Byzantine Agreement and Multi-party Computation with Active and Omission Corruption. 200-233 - Varun Narayanan

, Shubham Vivek Pawar, Akshayaram Srinivasan
:
Secure Computation with Parallel Calls to 2-Ary Functions. 234-265 - Ivan Damgård, Divya Ravi

, Lawrence Roy, Daniel Tschudi
, Sophia Yakoubov
:
Efficient Secure Communication over Dynamic Incomplete Networks with Minimal Connectivity. 266-292 - Nishanth Chandran, Juan A. Garay

, Ankit Kumar Misra
, Rafail Ostrovsky
, Vassilis Zikas
:
Adaptive Security, Erasures, and Network Assumptions in Communication-Local MPC. 293-326
Information-Theoretic Cryptography
- Yifan Song, Xiaxi Ye

:
Perfectly-Secure MPC with Constant Online Communication Complexity. 329-361 - Giovanni Deligios

, Anders Konring, Chen-Da Liu-Zhang
, Varun Narayanan
:
Statistical Layered MPC. 362-394 - Dustin Kasser:

An Improvement Upon the Bounds for the Local Leakage Resilience of Shamir's Secret Sharing Scheme. 395-422 - Jaspal Singh, Yu Wei, Vassilis Zikas:

Information-Theoretic Multi-server Private Information Retrieval with Client Preprocessing. 423-450 - Ittai Abraham

, Gilad Asharov
, Arpita Patra
, Gilad Stern
:
Asynchronous Agreement on a Core Set in Constant Expected Time and More Efficient Asynchronous VSS and MPC. 451-482
Secret Sharing
- Benny Applebaum

, Benny Pinkas
:
Distributing Keys and Random Secrets with Constant Complexity. 485-516 - Oriol Farràs

, Miquel Guiot
:
Reducing the Share Size of Weighted Threshold Secret Sharing Schemes via Chow Parameters Approximation. 517-547 - Bar Alon

, Amos Beimel
, Tamar Ben David
, Eran Omri
, Anat Paskin-Cherniavsky
:
New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs. 548-580 - Amos Beimel

, Oriol Farràs
, Or Lasri
, Oded Nir
:
Secret-Sharing Schemes for High Slices. 581-613 - Arka Rai Choudhuri

, Aarushi Goel
, Aditya Hegde
, Abhishek Jain
:
Homomorphic Secret Sharing with Verifiable Evaluation. 614-650

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














