Theory of Cryptography

9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings

Editors:

ISBN: 978-3-642-28913-2 (Print) 978-3-642-28914-9 (Online)

Table of contents (36 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Secure Computation

    1. No Access

      Book Chapter

      Pages 1-20

      Computing on Authenticated Data

    2. No Access

      Book Chapter

      Pages 21-38

      Identifying Cheaters without an Honest Majority

    3. No Access

      Book Chapter

      Pages 39-53

      On the Security of the “Free-XOR” Technique

    4. No Access

      Book Chapter

      Pages 54-74

      Secure Two-Party Computation with Low Communication

  3. (Blind) Signatures and Threshold Encryption

    1. No Access

      Book Chapter

      Pages 75-93

      Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions

    2. No Access

      Book Chapter

      Pages 94-111

      Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions

    3. No Access

      Book Chapter

      Pages 112-132

      On the Instantiability of Hash-and-Sign RSA Signatures

    4. No Access

      Book Chapter

      Pages 133-150

      Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures

  4. Zero-Knowledge and Security Models

    1. No Access

      Book Chapter

      Pages 151-168

      On Efficient Zero-Knowledge PCPs

    2. No Access

      Book Chapter

      Pages 169-189

      Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments

    3. No Access

      Book Chapter

      Pages 190-208

      Point Obfuscation and 3-Round Zero-Knowledge

    4. No Access

      Book Chapter

      Pages 209-229

      Confidentiality and Integrity: A Constructive Perspective

  5. Leakage-Resilience

    1. No Access

      Book Chapter

      Pages 230-247

      Leakage-Resilient Circuits without Computational Assumptions

    2. No Access

      Book Chapter

      Pages 248-265

      A Parallel Repetition Theorem for Leakage Resilience

    3. No Access

      Book Chapter

      Pages 266-284

      Leakage-Tolerant Interactive Protocols

  6. Hash Functions

    1. No Access

      Book Chapter

      Pages 285-302

      On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction

    2. No Access

      Book Chapter

      Pages 303-320

      Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry

  7. Differential Privacy

    1. No Access

      Book Chapter

      Pages 321-338

      Lower Bounds in Differential Privacy

    2. No Access

      Book Chapter

      Pages 339-356

      Iterative Constructions and Private Data Release

  8. Pseudorandomness I

    1. No Access

      Book Chapter

      Pages 357-368

      From Non-adaptive to Adaptive Pseudorandom Functions

previous Page of 2