Theory of Cryptography

12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I

  • Yevgeniy Dodis
  • Jesper Buus Nielsen
Conference proceedings TCC 2015

DOI: 10.1007/978-3-662-46494-6

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9014)

Table of contents

  1. Front Matter
  2. Foundations

    1. Andrej Bogdanov, Christina Brzuska
      Pages 1-6
    2. Siyao Guo, Tal Malkin, Igor C. Oliveira, Alon Rosen
      Pages 36-65
    3. Kai-Min Chung, Edward Lui, Rafael Pass
      Pages 66-92
  3. Symmetric Key

  4. Multiparty Computation

    1. Juan A. Garay, Ran Gelles, David S. Johnson, Aggelos Kiayias, Moti Yung
      Pages 134-158
    2. Tal Moran, Ilan Orlov, Silas Richelson
      Pages 159-181
    3. Ben A. Fisch, Daniel Freund, Moni Naor
      Pages 182-198
    4. Gilad Asharov, Amos Beimel, Nikolaos Makriyannis, Eran Omri
      Pages 199-228
    5. Vladimir Kolesnikov, Payman Mohassel, Ben Riva, Mike Rosulek
      Pages 229-259
  5. Concurrent and Resettable Security

    1. Vipul Goyal, Huijia Lin, Omkant Pandey, Rafael Pass, Amit Sahai
      Pages 260-289
    2. Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges
      Pages 319-344
    3. Rafail Ostrovsky, Alessandra Scafuro, Muthuramakrishnan Venkitasubramanian
      Pages 345-374
  6. Non-malleable Codes and Tampering

    1. Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
      Pages 375-397
    2. Divesh Aggarwal, Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
      Pages 398-426
    3. Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
      Pages 427-450
    4. Zahra Jafargholi, Daniel Wichs
      Pages 451-480

About these proceedings

Introduction

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015.
The 52 revised full papers presented were carefully reviewed and
selected from 137 submissions. The papers are organized in topical
sections on foundations, symmetric key, multiparty computation,
concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.

Keywords

RSA adaptive security coding theory communication complexity complexity classes concurrent algorithms cryptographic primitives cryptographic protocols cryptography distributed algorithms information theory interactive computation interactive proof systems physical cryptography problems, reductions and completeness public key encryption random graphs secure computation zero-knowledge

Editors and affiliations

  • Yevgeniy Dodis
    • 1
  • Jesper Buus Nielsen
    • 2
  1. 1.Department of Computer ScienceNew York UniversityNew YorkUSA
  2. 2.Department of Computer ScienceAarhus UniversityAarhus NDenmark

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-46493-9
  • Online ISBN 978-3-662-46494-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349