Skip to main content
  • Conference proceedings
  • © 2007

Theory of Cryptography

4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4392)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): TCC: Theory of Cryptography Conference

Conference proceedings info: TCC 2007.

Buying options

eBook USD 84.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (31 papers)

  1. Front Matter

  2. Encryption I

    1. Does Privacy Require True Randomness?

      • Carl Bosley, Yevgeniy Dodis
      Pages 1-20
  3. Universally Composable Security

    1. Long-Term Security and Universal Composability

      • Jörn Müller-Quade, Dominique Unruh
      Pages 41-60
    2. Universally Composable Security with Global Setup

      • Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish
      Pages 61-85
  4. Arguments and Zero Knowledge

    1. Parallel Repetition of Computationally Sound Protocols Revisited

      • Krzysztof Pietrzak, Douglas Wikström
      Pages 86-102
    2. Perfect NIZK with Adaptive Soundness

      • Masayuki Abe, Serge Fehr
      Pages 118-136
  5. Obfuscation

    1. On Best-Possible Obfuscation

      • Shafi Goldwasser, Guy N. Rothblum
      Pages 194-213
    2. Obfuscation for Cryptographic Purposes

      • Dennis Hofheinz, John Malone-Lee, Martijn Stam
      Pages 214-232
    3. Securely Obfuscating Re-encryption

      • Susan Hohenberger, Guy N. Rothblum, abhi shelat, Vinod Vaikuntanathan
      Pages 233-252
  6. Secret Sharing and Multiparty Computation

    1. Weakly-Private Secret Sharing Schemes

      • Amos Beimel, Matthew Franklin
      Pages 253-272
    2. On Secret Sharing Schemes, Matroids and Polymatroids

      • Jaume Martí-Farré, Carles Padró
      Pages 273-290
    3. Secure Linear Algebra Using Linearly Recurrent Sequences

      • Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew Franklin
      Pages 291-310
    4. Towards Optimal and Efficient Perfectly Secure Message Transmission

      • Matthias Fitzi, Matthew Franklin, Juan Garay, S. Harsha Vardhan
      Pages 311-322
  7. Signatures and Watermarking

    1. Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions

      • Carmit Hazay, Jonathan Katz, Chiu-Yuen Koo, Yehuda Lindell
      Pages 323-341
    2. Designated Confirmer Signatures Revisited

      • Douglas Wikström
      Pages 342-361

Other Volumes

  1. Theory of Cryptography

Keywords

  • DES
  • Zero Knowledge
  • authentication
  • cryprographic protocols
  • cryptanalysis
  • cryptographic paradigms
  • cryptographic primitives
  • cryptography
  • cryptology
  • digital signature schemes
  • encryption
  • interactive hashing
  • lower bounds
  • multi-party computation
  • privacy
  • algorithm analysis and problem complexity

Bibliographic Information

Buying options

eBook USD 84.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions