Book Volume 5978 2010

Theory of Cryptography

7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings


ISBN: 978-3-642-11798-5 (Print) 978-3-642-11799-2 (Online)

Table of contents (35 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Parallel Repetition

    1. Chapter

      Pages 1-18

      An Efficient Parallel Repetition Theorem

    2. Chapter

      Pages 19-36

      Parallel Repetition Theorems for Interactive Arguments

    3. Chapter

      Pages 37-51

      Almost Optimal Bounds for Direct Product Threshold Theorem

  3. Obfuscation

    1. Chapter

      Pages 52-71

      On Symmetric Encryption and Point Obfuscation

    2. Chapter

      Pages 72-89

      Obfuscation of Hyperplane Membership

  4. Invited Talk

    1. Chapter

      Pages 90-90

      Secure Computation and Its Diverse Applications

  5. Multiparty Computation

    1. Chapter

      Pages 91-108

      On Complete Primitives for Fairness

    2. Chapter

      Pages 109-127

      On the Necessary and Sufficient Assumptions for UC Computation

    3. Chapter

      Pages 128-145

      From Passive to Covert Security at Low Cost

  6. CCA Security

    1. Chapter

      Pages 146-164

      A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems

    2. Chapter

      Pages 165-182

      Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs

  7. Threshold Cryptography and Secret Sharing

    1. Chapter

      Pages 183-200

      Efficient, Robust and Constant-Round Distributed RSA Key Generation

    2. Chapter

      Pages 201-218

      Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems

    3. Chapter

      Pages 219-236

      Ideal Hierarchical Secret Sharing Schemes

  8. Symmetric Cryptography

    1. Chapter

      Pages 237-254

      A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch

    2. Chapter

      Pages 255-272

      On Related-Secret Pseudorandomness

    3. Chapter

      Pages 273-289

      A Domain Extender for the Ideal Cipher

    4. Chapter

      Pages 290-307

      Delayed-Key Message Authentication for Streams

  9. Key-Leakage and Tamper-Resistance

    1. Chapter

      Pages 308-326

      Founding Cryptography on Tamper-Proof Hardware Tokens

    2. Chapter

      Pages 327-342

      Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens

previous Page of 2