Theory of Cryptography

7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings

  • Daniele Micciancio
Conference proceedings TCC 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5978)

Table of contents

  1. Front Matter
  2. Parallel Repetition

    1. Johan Håstad, Rafael Pass, Douglas Wikström, Krzysztof Pietrzak
      Pages 1-18
    2. Kai-Min Chung, Feng-Hao Liu
      Pages 19-36
  3. Obfuscation

    1. Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs
      Pages 52-71
    2. Ran Canetti, Guy N. Rothblum, Mayank Varia
      Pages 72-89
  4. Invited Talk

  5. Multiparty Computation

    1. Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostrovsky, Amit Sahai
      Pages 91-108
    2. Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi
      Pages 109-127
    3. Ivan Damgård, Martin Geisler, Jesper Buus Nielsen
      Pages 128-145
  6. CCA Security

  7. Threshold Cryptography and Secret Sharing

    1. Ivan Damgård, Gert Læssøe Mikkelsen
      Pages 183-200
    2. Oriol Farràs, Carles Padró
      Pages 219-236
  8. Symmetric Cryptography

    1. David Goldenberg, Moses Liskov
      Pages 255-272
    2. Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin
      Pages 273-289
    3. Marc Fischlin, Anja Lehmann
      Pages 290-307
  9. Key-Leakage and Tamper-Resistance

    1. Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia
      Pages 308-326
    2. Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy N. Rothblum
      Pages 343-360
    3. Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kalai, Chris Peikert, Vinod Vaikuntanathan
      Pages 361-381
    4. Vadim Lyubashevsky, Adriana Palacio, Gil Segev
      Pages 382-400
  10. Rationality and Privacy

    1. Ronen Gradwohl
      Pages 401-418
    2. Georg Fuchsbauer, Jonathan Katz, David Naccache
      Pages 419-436
    3. Amos Beimel, Shiva Prasad Kasiviswanathan, Kobbi Nissim
      Pages 437-454
  11. Public-Key Encryption

    1. Michel Abdalla, Mihir Bellare, Gregory Neven
      Pages 480-497
  12. Invited Talk

  13. Zero-Knowledge

    1. Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam
      Pages 518-534
    2. Rafail Ostrovsky, Omkant Pandey, Ivan Visconti
      Pages 535-552
    3. Endre Bangerter, Jan Camenisch, Stephan Krenn
      Pages 553-571
    4. Eleanor Birrell, Salil Vadhan
      Pages 572-587
    5. Rafael Pass, Muthuramakrishnan Venkitasubramaniam
      Pages 588-605
    6. Daniele Micciancio
      Pages E1-E1
  14. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the Seventh Theory of Cryptography Conference, TCC 2010, held in Zurich, Switzerland, February 9-11, 2010.

The 33 revised full papers presented together with two invited talks were carefully reviewed and selected from 100 submissions.The papers are organized in topical sections on parallel repetition, obfuscation, multiparty computation, CCA security, threshold cryptography and secret sharing, symmetric cryptography, key-leakage and tamper-resistance, rationality and privacy, public-key encryption, and zero-knowledge.


Information RSA authentication communication complexity cryptographic algorithms cryptography cryptology game theory mathematical logic obfuscation public key security signatures

Editors and affiliations

  • Daniele Micciancio
    • 1
  1. 1.Computer Science & Engineering DepartmentUniversity of California,San DiegoUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-11798-5
  • Online ISBN 978-3-642-11799-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site