TCC 2016-B: Accepted Papers

Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
Jeremiah Blocki, Hong-Sheng Zhou

Fast Pseudorandom Functions Based on Expander Graphs
Benny Applebaum, Pavel Raykov

More Efficient Constant-Round Multi-Party Computation from BMR and SHE
Yehuda Lindell, Nigel P. Smart, Eduardo Soria-Vazquez

Perfectly Secure Message Transmission in Two Rounds
Gabriele Spini, Gilles Zémor

Simultaneous Secrecy and Reliability Amplification for a General Channel Model
Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets, Bruce M. Kapron, Valerie King, Stefano Tessaro

Binary AMD Circuits from Secure Multiparty Computation
Daniel Genkin, Yuval Ishai, Mor Weiss

Standard Security Does Not Imply Indistinguishability Under Selective Opening
Dennis Hofheinz, Vanishree Rao, Daniel Wichs

Single-Key to Multi-Key Functional Encryption with Polynomial Loss
Sanjam Garg, Akshayaram Srinivasan

Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
Rishab Goyal, Venkata Koppula, Brent Waters

Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
Dennis Hofheinz, Tibor Jager, Andy Rupp

Proof of Space from Stacked Expanders
Ling Ren, Srinivas Devadas

Threshold Secret Sharing Requires a Linear Size Alphabet
Andrej Bogdanov, Siyao Guo, Ilan Komargodski

Oblivious Transfer from Any Non-Trivial Elastic Noisy Channel via Secret Key Agreement
Ignacio Cascudo, Ivan Damgård, Felipe Lacerda, Samuel Ranellucci

Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
Ilan Komargodski

Access Control Encryption: Enforcing Information Flow with Cryptography
Ivan Damgård, Helene Haagh, Claudio Orlandi

How to Share a Secret, Infinitely
Ilan Komargodski, Moni Naor, Eylon Yogev

Strong Hardness of Privacy from Weak Traitor Tracing
Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, Mark Zhandry

On the (In)security of SNARKs in the Presence of Oracles
Dario Fiore, Anca Nitulescu

Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
Ehsan Ebrahimi Targhi, Dominique Unruh

Towards Non-Black-Box Separations of Public Key Encryption and One Way Function
Dana Dachman-Soled

3-Message Zero Knowledge Against Human Ignorance
Nir Bitansky, Zvika Brakerski, Yael Kalai, Omer Paneth, Vinod Vaikuntanathan

Interactive Oracle Proofs
Eli Ben-Sasson, Alessandro Chiesa, Nicholas Spooner

Multi-Key FHE from LWE, Revisited
Chris Peikert, Sina Shiehian

The GGM Function Family is a Weakly One-Way Family of Functions
Aloni Cohen, Saleet Klein

Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious
Bar Alon, Eran Omri

Adaptive Security of Yao's Garbled Circuits
Zahra Jafargholi, Daniel Wichs

Compactness vs Collusion Resistance in Functional Encryption
Baiyu Li, Daniele Micciancio

Delegating RAM Computations
Yael Kalai, Omer Paneth

Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
Carmit Hazay, Avishay Yanai

Adaptive Succinct Garbled RAM, or How To Delegate Your Database
Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova

Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
Mark Bun, Thomas Steinke

Separating Computational and Statistical Differential Privacy in the Client-Server Model
Mark Bun, Yi-Hsiu Chen, Salil P. Vadhan

Targeted Homomorphic Attribute-Based Encryption
Zvika Brakerski, David Cash, Rotem Tsabary, Hoeteck Wee

Cross&Clean: Amortized Garbled Circuits With Constant Overhead
Jesper Buus Nielsen, Claudio Orlandi

Efficient Secure Multiparty Computation with Identifiable Abort
Carsten Baum, Emmanuela Orsini, Peter Scholl

Composable Adaptive Secure Protocols without Setup under Polytime Assumptions
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam

From Cryptomania to Obfustopia through Secret-Key Functional Encryption
Nir Bitansky, Ryo Nishimaki, Alain Passelègue, Daniel Wichs

Secure Obfuscation in a Weak Multilinear Map Model
Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry

Composable Security in the Tamper-Proof Hardware Model under Minimal Complexity
Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam

Simulating Auxiliary Inputs, Revisited
Maciej Skorski

Pseudoentropy: Lower-bounds for Chain rules and Transformations
Krzysztof Pietrzak, Maciej Skorski

Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents
Shashank Agrawal, Manoj Prabhakaran, Ching-Hua Yu

Delegating RAM Computations with Adaptive Soundness and Privacy
Prabhanjan Ananth, Yu-Chi Chen, Kai-Min Chung, Huijia Lin, Wei-Kai Lin

Secure Multiparty RAM Computation in Constant Rounds
Sanjam Garg, Divya Gupta, Peihan Miao, Omkant Pandey

Deniable Attribute Based Encryption for Branching Programs from LWE
Daniel Apon, Xiong Fan, Feng-Hao Liu