© 2011

Theory of Cryptography

8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings

  • Yuval Ishai
Conference proceedings TCC 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6597)

Table of contents

  1. Front Matter
  2. Hardness Amplification

  3. Invited Talk 1

  4. Leakage Resilience

    1. Abhishek Jain, Krzysztof Pietrzak
      Pages 58-69
    2. Allison Lewko, Yannis Rouselakis, Brent Waters
      Pages 70-88
    3. Tal Malkin, Isamu Teranishi, Yevgeniy Vahlis, Moti Yung
      Pages 89-106
    4. Shai Halevi, Huijia Lin
      Pages 107-124
  5. Tamper Resilience

    1. Stefan Dziembowski, Tomasz Kazana, Daniel Wichs
      Pages 125-143
    2. Ivan Damgård, Sigurd Meldgaard, Jesper Buus Nielsen
      Pages 144-163
    3. Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade
      Pages 164-181
    4. Vipul Goyal, Adam O’Neill, Vanishree Rao
      Pages 182-200
  6. Encryption

    1. Zvika Brakerski, Shafi Goldwasser, Yael Tauman Kalai
      Pages 201-218
    2. Mihir Bellare, Brent Waters, Scott Yilek
      Pages 235-252
    3. Dan Boneh, Amit Sahai, Brent Waters
      Pages 253-273
  7. Composable Security

    1. Huijia Lin, Rafael Pass
      Pages 274-292
    2. Jonathan Katz, Vinod Vaikuntanathan
      Pages 293-310
    3. Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai
      Pages 311-328

About these proceedings


This book constitutes the thoroughly refereed proceedings of the 8th Theory of Cryptography Conference, TCC 2011, held in Providence, Rhode Island, USA, in March 2011.

The 35 revised full papers are presented together with 2 invited talks and were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on hardness amplification, leakage resilience, tamper resilience, encryption, composable security, secure computation, privacy, coin tossing and pseudorandomness, black-box constructions and separations, and black box separations.


computational hardness conditional security cryptographic attacks digital signatures functional encryption hash functions multi-party computation oblivious transfer provable security pseudo-randomness quantum computing randomness zero-knowledge protocols

Editors and affiliations

  • Yuval Ishai
    • 1
  1. 1.Computer Science DepartmentTechnionHaifaIsrael

Bibliographic information