Theory of Cryptography

11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings

  • Yehuda Lindell
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8349)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Obfuscation

    1. Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai
      Pages 26-51
    2. Elette Boyle, Kai-Min Chung, Rafael Pass
      Pages 52-73
  3. Applications of Obfuscation

    1. Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova
      Pages 74-94
    2. Takahiro Matsuda, Goichiro Hanaoka
      Pages 95-120
  4. Zero Knowledge

    1. Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti
      Pages 167-191
    2. Kai-Min Chung, Rafail Ostrovsky, Rafael Pass, Muthuramakrishnan Venkitasubramaniam, Ivan Visconti
      Pages 192-216
  5. Black-Box Separations

    1. Dana Dachman-Soled, Mohammad Mahmoody, Tal Malkin
      Pages 217-239
    2. Mohammad Mahmoody, Hemanta K. Maji, Manoj Prabhakaran
      Pages 240-264
  6. Secure Computation

    1. Amos Beimel, Yuval Ishai, Ranjit Kumaresan, Eyal Kushilevitz
      Pages 317-342
    2. Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto
      Pages 343-367
    3. Carmit Hazay, Arpita Patra
      Pages 368-393
    4. Amos Beimel, Aner Ben-Efraim, Carles Padró, Ilya Tyomkin
      Pages 394-418
    5. Martin Hirt, Ueli Maurer, Pavel Raykov
      Pages 419-439
  7. Coding and Cryptographic Applications

    1. Mahdi Cheraghchi, Venkatesan Guruswami
      Pages 440-464

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. The 30 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box separations, secure computation, coding and cryptographic applications, leakage, encryption, hardware-aided secure protocols, and encryption and signatures.

Keywords

coding theory malicious adversaries oblivious transfer public-key encryption verifiable random functions

Editors and affiliations

  • Yehuda Lindell
    • 1
  1. 1.Department of Computer ScienceBar-Ilan UniversityRamat GanIsrael

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-54242-8
  • Copyright Information International Association for Cryptologic Research 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-54241-1
  • Online ISBN 978-3-642-54242-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349