Theory of Cryptography

12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I

  • Yevgeniy Dodis
  • Jesper Buus Nielsen
Conference proceedings TCC 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9014)

Table of contents

  1. Front Matter
  2. Foundations

  3. Symmetric Key

  4. Multiparty Computation

    1. Juan A. Garay, Ran Gelles, David S. Johnson, Aggelos Kiayias, Moti Yung
      Pages 134-158
    2. Tal Moran, Ilan Orlov, Silas Richelson
      Pages 159-181
    3. Ben A. Fisch, Daniel Freund, Moni Naor
      Pages 182-198
    4. Gilad Asharov, Amos Beimel, Nikolaos Makriyannis, Eran Omri
      Pages 199-228
    5. Vladimir Kolesnikov, Payman Mohassel, Ben Riva, Mike Rosulek
      Pages 229-259
  5. Concurrent and Resettable Security

    1. Vipul Goyal, Huijia Lin, Omkant Pandey, Rafael Pass, Amit Sahai
      Pages 260-289
    2. Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges
      Pages 319-344
    3. Rafail Ostrovsky, Alessandra Scafuro, Muthuramakrishnan Venkitasubramanian
      Pages 345-374
  6. Non-malleable Codes and Tampering

    1. Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
      Pages 375-397
    2. Divesh Aggarwal, Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
      Pages 398-426
    3. Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
      Pages 427-450
    4. Zahra Jafargholi, Daniel Wichs
      Pages 451-480
    5. Ronald Cramer, Carles Padró, Chaoping Xing
      Pages 481-501
  7. Privacy Amplification

  8. Encryption and Key Exchange

    1. Sandro Coretti, Ueli Maurer, Björn Tackmann, Daniele Venturi
      Pages 532-560
    2. Brett Hemenway, Rafail Ostrovsky, Alon Rosen
      Pages 591-608
    3. Adam Smith, Ye Zhang
      Pages 609-628
    4. Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li
      Pages 629-658
  9. Back Matter

Other volumes

  1. Theory of Cryptography
    12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I
  2. 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II

About these proceedings


The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015.
The 52 revised full papers presented were carefully reviewed and
selected from 137 submissions. The papers are organized in topical
sections on foundations, symmetric key, multiparty computation,
concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.


RSA adaptive security coding theory communication complexity complexity classes concurrent algorithms cryptographic primitives cryptographic protocols cryptography distributed algorithms information theory interactive computation interactive proof systems physical cryptography problems, reductions and completeness public key encryption random graphs secure computation zero-knowledge

Editors and affiliations

  • Yevgeniy Dodis
    • 1
  • Jesper Buus Nielsen
    • 2
  1. 1.Department of Computer ScienceNew York UniversityNew YorkUSA
  2. 2.Department of Computer ScienceAarhus UniversityAarhus NDenmark

Bibliographic information

  • DOI
  • Copyright Information International Association for Cryptologic Research 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-662-46493-9
  • Online ISBN 978-3-662-46494-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site