Sciweavers

TCC
2016
Springer
101views Cryptology» more  TCC 2016»
10 years 16 days ago
Cryptographic Assumptions: A Position Paper
Shafi Goldwasser, Yael Tauman Kalai
TCC
2016
Springer
52views Cryptology» more  TCC 2016»
10 years 16 days ago
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back
G¨o¨os, Pitassi and Watson (ITCS, 2015) have recently introduced the notion of Zero-Information Arthur-Merlin Protocols (ZAM). In this model, which can be viewed as a private ve...
Benny Applebaum, Pavel Raykov
TCC
2016
Springer
41views Cryptology» more  TCC 2016»
10 years 16 days ago
On the Hardness of Learning with Rounding over Small Modulus
We show the following reductions from the learning with errors problem (LWE) to the learning with rounding problem (LWR): (1) Learning the secret and (2) distinguishing samples fro...
Andrej Bogdanov, Siyao Guo, Daniel Masny, Silas Ri...
122
Voted
TCC
2016
Springer
43views Cryptology» more  TCC 2016»
10 years 16 days ago
Cutting-Edge Cryptography Through the Lens of Secret Sharing
Secret sharing is a mechanism by which a trusted dealer holding a secret “splits” the secret into many “shares” and distributes the shares to a collection of parties. Asso...
Ilan Komargodski, Mark Zhandry