Theory of Cryptography

9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings

  • Ronald Cramer
Conference proceedings TCC 2012

DOI: 10.1007/978-3-642-28914-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7194)

Table of contents (36 papers)

  1. Front Matter
  2. Secure Computation

    1. Computing on Authenticated Data
      Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, abhi shelat, Brent Waters
      Pages 1-20
    2. Identifying Cheaters without an Honest Majority
      Yuval Ishai, Rafail Ostrovsky, Hakan Seyalioglu
      Pages 21-38
    3. On the Security of the “Free-XOR” Technique
      Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou
      Pages 39-53
    4. Secure Two-Party Computation with Low Communication
      Ivan Damgård, Sebastian Faust, Carmit Hazay
      Pages 54-74
  3. (Blind) Signatures and Threshold Encryption

  4. Zero-Knowledge and Security Models

    1. On Efficient Zero-Knowledge PCPs
      Yuval Ishai, Mohammad Mahmoody, Amit Sahai
      Pages 151-168
    2. Point Obfuscation and 3-Round Zero-Knowledge
      Nir Bitansky, Omer Paneth
      Pages 190-208
    3. Confidentiality and Integrity: A Constructive Perspective
      Ueli Maurer, Andreas Rüedlinger, Björn Tackmann
      Pages 209-229
  5. Leakage-Resilience

    1. Leakage-Resilient Circuits without Computational Assumptions
      Stefan Dziembowski, Sebastian Faust
      Pages 230-247
    2. A Parallel Repetition Theorem for Leakage Resilience
      Zvika Brakerski, Yael Tauman Kalai
      Pages 248-265
    3. Leakage-Tolerant Interactive Protocols
      Nir Bitansky, Ran Canetti, Shai Halevi
      Pages 266-284
  6. Hash Functions

  7. Differential Privacy

    1. Lower Bounds in Differential Privacy
      Anindya De
      Pages 321-338
    2. Iterative Constructions and Private Data Release
      Anupam Gupta, Aaron Roth, Jonathan Ullman
      Pages 339-356

About these proceedings

Introduction

This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.

Keywords

communication complexity concrete security public-key encryption rsa signature secure multiparty computation

Editors and affiliations

  • Ronald Cramer
    • 1
  1. 1.Cryptology Group, CWI Amsterdam; and Mathematical InstituteLeiden University, ,LeidenThe Netherlands

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-28913-2
  • Online ISBN 978-3-642-28914-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349