Theory of Cryptography

Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings


ISBN: 978-3-540-78523-1 (Print) 978-3-540-78524-8 (Online)

Table of contents (34 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Technical Session 1

    1. Book Chapter

      Pages 1-18

      Incrementally Verifiable Computation or Proofs of Knowledge Imply Time/Space Efficiency

    2. Book Chapter

      Pages 19-36

      On Seed-Incompressible Functions

  3. Technical Session 2

    1. Book Chapter

      Pages 37-54

      Asymptotically Efficient Lattice-Based Digital Signatures

    2. Book Chapter

      Pages 55-72

      Basing Weak Public-Key Cryptography on Strong One-Way Functions

  4. Technical Session 3

    1. Book Chapter

      Pages 73-88

      Which Languages Have 4-Round Zero-Knowledge Proofs?

    2. Book Chapter

      Pages 89-106

      How to Achieve Perfect Simulation and A Complete Problem for Non-interactive Perfect Zero-Knowledge

    3. Book Chapter

      Pages 107-124

      General Properties of Quantum Zero-Knowledge Proofs

  5. Technical Session 4

    1. Book Chapter

      Pages 125-141

      The Layered Games Framework for Specifications and Analysis of Security Protocols

    2. Book Chapter

      Pages 142-154

      Universally Composable Multi-party Computation with an Unreliable Common Reference String

    3. Book Chapter

      Pages 155-175

      Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries

    4. Book Chapter

      Pages 176-193

      Fast Private Norm Estimation and Heavy Hitters

  6. Technical Session 5

    1. Book Chapter

      Pages 194-212

      Matroids Can Be Far from Ideal Secret Sharing

    2. Book Chapter

      Pages 213-230

      Perfectly-Secure MPC with Linear Communication Complexity

    3. Book Chapter

      Pages 231-250

      MPC vs. SFE: Perfect Security in a Unified Corruption Model

  7. Invited Talk

    1. Book Chapter

      Pages 251-272

      Bridging Game Theory and Cryptography: Recent Results and Future Directions

  8. Technical Session 6

    1. Book Chapter

      Pages 273-301

      Verifiably Secure Devices

    2. Book Chapter

      Pages 302-319

      Lower Bounds on Implementing Robust and Resilient Mediators

    3. Book Chapter

      Pages 320-339

      Cryptography and Game Theory: Designing Protocols for Exchanging Information

  9. Technical Session 7

    1. Book Chapter

      Pages 340-355

      Equivocal Blind Signatures and Adaptive UC-Security

    2. Book Chapter

      Pages 356-374

      P-signatures and Noninteractive Anonymous Credentials

previous Page of 2