Theory of Cryptography

7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings

  • Daniele Micciancio
Conference proceedings TCC 2010
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5978)

Table of contents

  1. Front Matter
  2. Parallel Repetition

    1. Johan Håstad, Rafael Pass, Douglas Wikström, Krzysztof Pietrzak
      Pages 1-18
    2. Kai-Min Chung, Feng-Hao Liu
      Pages 19-36
  3. Obfuscation

    1. Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs
      Pages 52-71
    2. Ran Canetti, Guy N. Rothblum, Mayank Varia
      Pages 72-89
  4. Invited Talk

  5. Multiparty Computation

    1. Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostrovsky, Amit Sahai
      Pages 91-108
    2. Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi
      Pages 109-127
    3. Ivan Damgård, Martin Geisler, Jesper Buus Nielsen
      Pages 128-145
  6. CCA Security

  7. Threshold Cryptography and Secret Sharing

    1. Ivan Damgård, Gert Læssøe Mikkelsen
      Pages 183-200
    2. Oriol Farràs, Carles Padró
      Pages 219-236
  8. Symmetric Cryptography

    1. David Goldenberg, Moses Liskov
      Pages 255-272
    2. Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin
      Pages 273-289
    3. Marc Fischlin, Anja Lehmann
      Pages 290-307
  9. Key-Leakage and Tamper-Resistance

    1. Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia
      Pages 308-326

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Seventh Theory of Cryptography Conference, TCC 2010, held in Zurich, Switzerland, February 9-11, 2010.

The 33 revised full papers presented together with two invited talks were carefully reviewed and selected from 100 submissions.The papers are organized in topical sections on parallel repetition, obfuscation, multiparty computation, CCA security, threshold cryptography and secret sharing, symmetric cryptography, key-leakage and tamper-resistance, rationality and privacy, public-key encryption, and zero-knowledge.

Keywords

Information RSA authentication communication complexity cryptographic algorithms cryptography cryptology game theory mathematical logic obfuscation public key security signatures

Editors and affiliations

  • Daniele Micciancio
    • 1
  1. 1.Computer Science & Engineering DepartmentUniversity of California,San DiegoUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-11799-2
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-11798-5
  • Online ISBN 978-3-642-11799-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349