Theory of Cryptography

9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings

  • Ronald Cramer
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7194)

Table of contents

  1. Front Matter
  2. Secure Computation

    1. Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, abhi shelat, Brent Waters
      Pages 1-20
    2. Yuval Ishai, Rafail Ostrovsky, Hakan Seyalioglu
      Pages 21-38
    3. Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou
      Pages 39-53
    4. Ivan Damgård, Sebastian Faust, Carmit Hazay
      Pages 54-74
  3. (Blind) Signatures and Threshold Encryption

  4. Zero-Knowledge and Security Models

    1. Yuval Ishai, Mohammad Mahmoody, Amit Sahai
      Pages 151-168
    2. Nir Bitansky, Omer Paneth
      Pages 190-208
    3. Ueli Maurer, Andreas Rüedlinger, Björn Tackmann
      Pages 209-229
  5. Leakage-Resilience

    1. Stefan Dziembowski, Sebastian Faust
      Pages 230-247
    2. Zvika Brakerski, Yael Tauman Kalai
      Pages 248-265
    3. Nir Bitansky, Ran Canetti, Shai Halevi
      Pages 266-284
  6. Hash Functions

  7. Differential Privacy

    1. Anindya De
      Pages 321-338
    2. Anupam Gupta, Aaron Roth, Jonathan Ullman
      Pages 339-356

About these proceedings

Introduction

This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.

Keywords

communication complexity concrete security public-key encryption rsa signature secure multiparty computation

Editors and affiliations

  • Ronald Cramer
    • 1
  1. 1.Cryptology Group, CWI Amsterdam; and Mathematical InstituteLeiden University, ,LeidenThe Netherlands

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-28914-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-28913-2
  • Online ISBN 978-3-642-28914-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349