Skip to main content
  • Conference proceedings
  • © 2008

Theory of Cryptography

Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4948)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): TCC: Theory of Cryptography Conference

Conference proceedings info: TCC 2008.

Buying options

eBook USD 109.00
Price excludes VAT (USA)
  • ISBN: 978-3-540-78524-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 139.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (34 papers)

  1. Front Matter

  2. Technical Session 1

    1. On Seed-Incompressible Functions

      • Shai Halevi, Steven Myers, Charles Rackoff
      Pages 19-36
  3. Technical Session 2

    1. Asymptotically Efficient Lattice-Based Digital Signatures

      • Vadim Lyubashevsky, Daniele Micciancio
      Pages 37-54
    2. Basing Weak Public-Key Cryptography on Strong One-Way Functions

      • Eli Biham, Yaron J. Goren, Yuval Ishai
      Pages 55-72
  4. Technical Session 5

    1. Matroids Can Be Far from Ideal Secret Sharing

      • Amos Beimel, Noam Livne, Carles Padró
      Pages 194-212
    2. Perfectly-Secure MPC with Linear Communication Complexity

      • Zuzana Beerliová-Trubíniová, Martin Hirt
      Pages 213-230
    3. MPC vs. SFE: Perfect Security in a Unified Corruption Model

      • Zuzana Beerliová-Trubíniová, Matthias Fitzi, Martin Hirt, Ueli Maurer, Vassilis Zikas
      Pages 231-250
  5. Technical Session 6

    1. Verifiably Secure Devices

      • Sergei Izmalkov, Matt Lepinski, Silvio Micali
      Pages 273-301
    2. Lower Bounds on Implementing Robust and Resilient Mediators

      • Ittai Abraham, Danny Dolev, Joseph Y. Halpern
      Pages 302-319
  6. Technical Session 7

    1. Equivocal Blind Signatures and Adaptive UC-Security

      • Aggelos Kiayias, Hong-Sheng Zhou
      Pages 340-355

Other Volumes

  1. Theory of Cryptography

    Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings

Keywords

  • DES
  • Information
  • Private Information Retrieval
  • Signatur
  • communication
  • complexity
  • cryptographic protocols
  • cryptography
  • cryptology
  • digital signature schemes
  • game theory
  • lower bounds
  • multi-party computation
  • multicast encryption
  • security
  • algorithm analysis and problem complexity

Bibliographic Information

Buying options

eBook USD 109.00
Price excludes VAT (USA)
  • ISBN: 978-3-540-78524-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 139.99
Price excludes VAT (USA)