Theory of Cryptography

Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings

Editors:

ISBN: 978-3-540-24573-5 (Print) 978-3-540-30576-7 (Online)

Table of contents (32 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Hardness Amplification and Error Correction

    1. Book Chapter

      Pages 1-16

      Optimal Error Correction Against Computationally Bounded Noise

    2. Book Chapter

      Pages 17-33

      Hardness Amplification of Weakly Verifiable Puzzles

    3. Book Chapter

      Pages 34-49

      On Hardness Amplification of One-Way Functions

  3. Graphs and Groups

    1. Book Chapter

      Pages 50-65

      Cryptography in Subgroups of \(\mathbb{Z}_{n}^{*}\)

    2. Book Chapter

      Pages 66-85

      Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs

  4. Simulation and Secure Computation

    1. Book Chapter

      Pages 86-103

      Comparing Two Notions of Simulatability

    2. Book Chapter

      Pages 104-127

      Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation

    3. Book Chapter

      Pages 128-149

      Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs

  5. Security of Encryption

    1. Book Chapter

      Pages 150-168

      Adaptively-Secure, Non-interactive Public-Key Encryption

    2. Book Chapter

      Pages 169-187

      Adaptive Security of Symbolic Encryption

    3. Book Chapter

      Pages 188-209

      Chosen-Ciphertext Security of Multiple Encryption

  6. Steganography and Zero Knowledge

    1. Book Chapter

      Pages 210-226

      Public-Key Steganography with Active Attacks

    2. Book Chapter

      Pages 227-244

      Upper and Lower Bounds on Black-Box Steganography

    3. Book Chapter

      Pages 245-263

      Fair-Zero Knowledge

  7. Secure Computation I

    1. Book Chapter

      Pages 264-282

      How to Securely Outsource Cryptographic Computations

    2. Book Chapter

      Pages 283-302

      Secure Computation of the Mean and Related Statistics

    3. Book Chapter

      Pages 303-324

      Keyword Search and Oblivious Pseudorandom Functions

  8. Secure Computation II

    1. Book Chapter

      Pages 325-341

      Evaluating 2-DNF Formulas on Ciphertexts

    2. Book Chapter

      Pages 342-362

      Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation

    3. Book Chapter

      Pages 363-385

      Toward Privacy in Public Databases

previous Page of 2