will take place in on . is organized by the International Association for Cryptologic Research (IACR). Papers presenting original research on foundational and theoretical aspects of cryptography are sought. For more information about TCC, see the TCC manifesto.
The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them. More specifically, the scope of the conference includes, but is not limited to the:
May 17, 2018
Submission deadline at 22:00 UTC
August 30, 2018
Notification of Decision
September 25, 2018
Camera-ready deadline at 22:00 UTC
November 11-14, 2018
Conference
The Theory of Cryptography Conference is dedicated to providing a premier venue for the dissemination of results within its scope. The conference aims to provide a meeting place for researchers and to be instrumental in shaping the identity of the theoretical cryptography community.
The submission should begin with a title, followed by the names, affiliations and contact information of all authors, and a short abstract. It should contain a scholarly exposition of ideas, techniques, and results, including motivation and a clear comparison with related work. The authors have two choices for the paper format. They may typeset their paper using Springer LNCS format with page numbers enabled (\pagestyle{plain}), keeping spacing, font sizes, and margins provided by the format. Alternatively, they may typeset their paper to fit on US letter or ISO A4 paper with at least 11pt font and reasonable spacing and margins. There is no page limit, but the paper should be intelligible by reviewers who are not required to read past the 15th page of the Springer format or past the 12th page of any other format (the bibliography does not need to appear in the first 12 or 15 pages, respectively).
Submissions must not substantially duplicate work that was published elsewhere, or work that any of the authors has submitted in parallel to any other journal, conference, or workshop that has proceedings; see the IACR policy on irregular submissions for more information. IACR reserves the right to share information about submissions with other Program Committees. At least one author of each accepted paper is required to present the paper at the conference; presentations may be recorded and made available to the public online. Authors are strongly encouraged to post full versions of their submissions in a freely accessible online repository, such as the Cryptology ePrint archive. We encourage the authors to post such a version at the time of submission (in which case the authors should provide a link on the title page of their submission). At the minimum, we expect that authors of accepted papers will post a full version of their papers by the camera-ready deadline. Abstracts of accepted papers will be made public by the PC following the notification.
At submission time, authors must provide one or several email addresses for corresponding authors. Throughout the review period, at least one corresponding author is expected to be available to receive and quickly answer questions (via email) that arise about their submissions.
Papers must be submitted electronically through the submission web page. The authors are allowed to revise the paper any number of times before the submission deadline, and only the latest submitted version will be seen by the PC. Therefore, the authors are advised not to wait until the last moment for the initial submission.
A conflict of interest (COI) is a situation in which a person is involved in multiple interests, one of which could affect the judgment of that individual. A general rule is that anyone is considered in conflict if a reasonable person would question the individual as an impartial reviewer, once relevant information is given. As the submissions to TCC are not anonymous we do not ask the authors to declare COI in the submission; instead we require reviewers to declare a COI.
We say that a reviewer has an automatic COI with an author if:
If the authors feel that certain experts are strongly biased against their paper, they should inform the PC chairs about it by email. The PC chairs reserve the right to request a more specific description of a COI declaration from authors.
This prize is for the best paper authored solely by students, where a student is a person that is considered a student by the respective institution at the time of the paper's submission. Eligibility must be indicated at the time of submission (in the "Comments to Chair" field in the submission form). The program committee may decline to make the award, or may split it among several papers.
Proceedings will be published in Lecture Notes in Computer Science (LNCS) with Springer. The on-line version will be available at the conference. Physical books will be available after the conference for a separate fee. Instructions for preparing the final proceedings version will be sent to the authors of accepted papers. The final copies of the accepted papers will be due on the camera-ready deadline listed above. This is a strict deadline, and authors should prepare accordingly.
Ivan Damgård (Aarhus U., Denmark); Shai Halevi [chair] (IBM, USA); Huijia (Rachel) Lin (UCSB, USA); Tal Malkin (Columbia U., USA); Ueli Maurer (ETH, Switzerland); Moni Naor (Weizmann Inst., Israel); Manoj M. Prabhakaran (IIT Bombay, India).