Theory of Cryptography

8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings

  • Yuval Ishai
Conference proceedings TCC 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6597)

Table of contents

  1. Front Matter
  2. Hardness Amplification

  3. Invited Talk 1

  4. Leakage Resilience

    1. Abhishek Jain, Krzysztof Pietrzak
      Pages 58-69
    2. Allison Lewko, Yannis Rouselakis, Brent Waters
      Pages 70-88
    3. Tal Malkin, Isamu Teranishi, Yevgeniy Vahlis, Moti Yung
      Pages 89-106
    4. Shai Halevi, Huijia Lin
      Pages 107-124
  5. Tamper Resilience

    1. Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
      Pages 125-143
    2. Ivan Damgård, Sigurd Meldgaard, Jesper Buus Nielsen
      Pages 144-163
    3. Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade
      Pages 164-181
    4. Vipul Goyal, Adam O’Neill, Vanishree Rao
      Pages 182-200
  6. Encryption

    1. Zvika Brakerski, Shafi Goldwasser, Yael Tauman Kalai
      Pages 201-218
    2. Mihir Bellare, Brent Waters, Scott Yilek
      Pages 235-252
    3. Dan Boneh, Amit Sahai, Brent Waters
      Pages 253-273
  7. Composable Security

    1. Huijia Lin, Rafael Pass
      Pages 274-292
    2. Jonathan Katz, Vinod Vaikuntanathan
      Pages 293-310
    3. Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai
      Pages 311-328
  8. Secure Computation

  9. Privacy

    1. Jonathan Ullman, Salil Vadhan
      Pages 400-416
    2. Adam Groce, Jonathan Katz, Arkady Yerukhimovich
      Pages 417-431
    3. Johannes Gehrke, Edward Lui, Rafael Pass
      Pages 432-449
  10. Coin Tossing and Pseudorandomness

    1. Dana Dachman-Soled, Yehuda Lindell, Mohammad Mahmoody, Tal Malkin
      Pages 450-467
    2. Esther Hänggi, Jürg Wullschleger
      Pages 468-485
    3. Hemanta K. Maji, Pichayoot Ouppaphan, Manoj Prabhakaran, Mike Rosulek
      Pages 486-503
    4. Josh Bronson, Ali Juma, Periklis A. Papakonstantinou
      Pages 504-521
  11. Invited Talk 2

  12. Black-Box Constructions and Separations

    1. Zvika Brakerski, Jonathan Katz, Gil Segev, Arkady Yerukhimovich
      Pages 559-578
    2. Rafael Pass, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam
      Pages 579-596
  13. Black-Box Separations

    1. Takahiro Matsuda, Kanta Matsuura
      Pages 597-614
    2. Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich
      Pages 615-629
  14. Back Matter

About these proceedings


This book constitutes the thoroughly refereed proceedings of the 8th Theory of Cryptography Conference, TCC 2011, held in Providence, Rhode Island, USA, in March 2011.

The 35 revised full papers are presented together with 2 invited talks and were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on hardness amplification, leakage resilience, tamper resilience, encryption, composable security, secure computation, privacy, coin tossing and pseudorandomness, black-box constructions and separations, and black box separations.


computational hardness conditional security cryptographic attacks digital signatures functional encryption hash functions multi-party computation oblivious transfer provable security pseudo-randomness quantum computing randomness zero-knowledge protocols

Editors and affiliations

  • Yuval Ishai
    • 1
  1. 1.Computer Science DepartmentTechnionHaifaIsrael

Bibliographic information

  • DOI
  • Copyright Information International Association for Cryptologic Research 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-19570-9
  • Online ISBN 978-3-642-19571-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site