Theory of Cryptography

8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings


ISBN: 978-3-642-19570-9 (Print) 978-3-642-19571-6 (Online)

Table of contents (37 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Hardness Amplification

    1. Book Chapter

      Pages 1-18

      Input Locality and Hardness Amplification

    2. Book Chapter

      Pages 19-36

      General Hardness Amplification of Predicates and Puzzles

    3. Book Chapter

      Pages 37-54

      Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma

  3. Invited Talk 1

    1. Book Chapter

      Pages 55-57

      Dense Model Theorems and Their Applications

  4. Leakage Resilience

    1. Book Chapter

      Pages 58-69

      Parallel Repetition for Leakage Resilience Amplification Revisited

    2. Book Chapter

      Pages 70-88

      Achieving Leakage Resilience through Dual System Encryption

    3. Book Chapter

      Pages 89-106

      Signatures Resilient to Continual Leakage on Memory and Computation

    4. Book Chapter

      Pages 107-124

      After-the-Fact Leakage in Public-Key Encryption

  5. Tamper Resilience

    1. Book Chapter

      Pages 125-143

      One-Time Computable Self-erasing Functions

    2. Book Chapter

      Pages 144-163

      Perfectly Secure Oblivious RAM without Random Oracles

    3. Book Chapter

      Pages 164-181

      Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token

    4. Book Chapter

      Pages 182-200

      Correlated-Input Secure Hash Functions

  6. Encryption

    1. Book Chapter

      Pages 201-218

      Black-Box Circular-Secure Encryption beyond Affine Functions

    2. Book Chapter

      Pages 219-234

      Homomorphic Encryption: From Private-Key to Public-Key

    3. Book Chapter

      Pages 235-252

      Identity-Based Encryption Secure against Selective Opening Attack

    4. Book Chapter

      Pages 253-273

      Functional Encryption: Definitions and Challenges

  7. Composable Security

    1. Book Chapter

      Pages 274-292

      Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs

    2. Book Chapter

      Pages 293-310

      Round-Optimal Password-Based Authenticated Key Exchange

    3. Book Chapter

      Pages 311-328

      Bringing People of Different Beliefs Together to Do UC

  8. Secure Computation

    1. Book Chapter

      Pages 329-346

      Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer

previous Page of 2