Theory of Cryptography

7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings

  • Daniele Micciancio
Conference proceedings TCC 2010

DOI: 10.1007/978-3-642-11799-2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5978)

Table of contents (35 papers)

  1. Front Matter
  2. Parallel Repetition

    1. An Efficient Parallel Repetition Theorem
      Johan Håstad, Rafael Pass, Douglas Wikström, Krzysztof Pietrzak
      Pages 1-18
    2. Parallel Repetition Theorems for Interactive Arguments
      Kai-Min Chung, Feng-Hao Liu
      Pages 19-36
  3. Obfuscation

    1. On Symmetric Encryption and Point Obfuscation
      Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs
      Pages 52-71
    2. Obfuscation of Hyperplane Membership
      Ran Canetti, Guy N. Rothblum, Mayank Varia
      Pages 72-89
  4. Invited Talk

  5. Multiparty Computation

    1. On Complete Primitives for Fairness
      Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostrovsky, Amit Sahai
      Pages 91-108
    2. On the Necessary and Sufficient Assumptions for UC Computation
      Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi
      Pages 109-127
    3. From Passive to Covert Security at Low Cost
      Ivan Damgård, Martin Geisler, Jesper Buus Nielsen
      Pages 128-145
  6. CCA Security

  7. Threshold Cryptography and Secret Sharing

    1. Efficient, Robust and Constant-Round Distributed RSA Key Generation
      Ivan Damgård, Gert Læssøe Mikkelsen
      Pages 183-200
    2. Ideal Hierarchical Secret Sharing Schemes
      Oriol Farràs, Carles Padró
      Pages 219-236
  8. Symmetric Cryptography

    1. On Related-Secret Pseudorandomness
      David Goldenberg, Moses Liskov
      Pages 255-272
    2. A Domain Extender for the Ideal Cipher
      Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin
      Pages 273-289
    3. Delayed-Key Message Authentication for Streams
      Marc Fischlin, Anja Lehmann
      Pages 290-307
  9. Key-Leakage and Tamper-Resistance

    1. Founding Cryptography on Tamper-Proof Hardware Tokens
      Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia
      Pages 308-326

About these proceedings


This book constitutes the refereed proceedings of the Seventh Theory of Cryptography Conference, TCC 2010, held in Zurich, Switzerland, February 9-11, 2010.

The 33 revised full papers presented together with two invited talks were carefully reviewed and selected from 100 submissions.The papers are organized in topical sections on parallel repetition, obfuscation, multiparty computation, CCA security, threshold cryptography and secret sharing, symmetric cryptography, key-leakage and tamper-resistance, rationality and privacy, public-key encryption, and zero-knowledge.


Information RSA authentication communication complexity cryptographic algorithms cryptography cryptology game theory mathematical logic obfuscation public key security signatures

Editors and affiliations

  • Daniele Micciancio
    • 1
  1. 1.Computer Science & Engineering DepartmentUniversity of California,San DiegoUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-11798-5
  • Online ISBN 978-3-642-11799-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349