TCC: Theory of Cryptography Conference

Theory of Cryptography

12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II

  • Yevgeniy Dodis
  • Jesper Buus Nielsen

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9015)

Table of contents

  1. Front Matter
  2. Pseudorandom Functions and Applications

    1. Zvika Brakerski, Vinod Vaikuntanathan
      Pages 1-30
    2. Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens
      Pages 31-60
    3. Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan
      Pages 61-89
  3. Proofs and Verifiable Computation

    1. S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
      Pages 144-168
    2. Giulia Alberini, Tal Moran, Alon Rosen
      Pages 169-198
    3. Moni Naor, Asaf Ziv
      Pages 199-228
  4. Differential Privacy

    1. Edward Lui, Rafael Pass
      Pages 277-305
  5. Functional Encryption

    1. Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai
      Pages 325-351
  6. Obfuscation

    1. Venkata Koppula, Kim Ramchen, Brent Waters
      Pages 378-400
    2. Christina Brzuska, Pooya Farshim, Arno Mittelbach
      Pages 428-455
    3. Ran Canetti, Yael Tauman Kalai, Omer Paneth
      Pages 456-467
    4. Ran Canetti, Huijia Lin, Stefano Tessaro, Vinod Vaikuntanathan
      Pages 468-497

About these proceedings

Introduction

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015.
The 52 revised full papers presented were carefully reviewed and
selected from 137 submissions. The papers are organized in topical
sections on foundations, symmetric key, multiparty computation,
concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.

Keywords

RSA adaptive security coding theory communication complexity complexity classes concurrent algorithms cryptographic primitives cryptographic protocols cryptography distributed algorithms information theory interactive computation interactive proof systems physical cryptography problems, reductions and completeness public key encryption random graphs secure computation zero-knowledge

Editors and affiliations

  • Yevgeniy Dodis
    • 1
  • Jesper Buus Nielsen
    • 2
  1. 1.Department of Computer ScienceNew York UniversityNew YorkUSA
  2. 2.Department of Computer ScienceAarhus UniversityAarhus NDenmark

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-46497-7
  • Copyright Information International Association for Cryptologic Research 2015 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-46496-0
  • Online ISBN 978-3-662-46497-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book