Advertisement

Theory of Cryptography

9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings

  • Ronald Cramer

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7194)

Table of contents

  1. Front Matter
  2. Secure Computation

    1. Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, abhi shelat, Brent Waters
      Pages 1-20
    2. Yuval Ishai, Rafail Ostrovsky, Hakan Seyalioglu
      Pages 21-38
    3. Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou
      Pages 39-53
    4. Ivan Damgård, Sebastian Faust, Carmit Hazay
      Pages 54-74
  3. (Blind) Signatures and Threshold Encryption

  4. Zero-Knowledge and Security Models

    1. Yuval Ishai, Mohammad Mahmoody, Amit Sahai
      Pages 151-168
    2. Nir Bitansky, Omer Paneth
      Pages 190-208
    3. Ueli Maurer, Andreas Rüedlinger, Björn Tackmann
      Pages 209-229
  5. Leakage-Resilience

    1. Stefan Dziembowski, Sebastian Faust
      Pages 230-247
    2. Zvika Brakerski, Yael Tauman Kalai
      Pages 248-265
    3. Nir Bitansky, Ran Canetti, Shai Halevi
      Pages 266-284
  6. Hash Functions

  7. Differential Privacy

    1. Anindya De
      Pages 321-338
    2. Anupam Gupta, Aaron Roth, Jonathan Ullman
      Pages 339-356
  8. Pseudorandomness I

    1. Itay Berman, Iftach Haitner
      Pages 357-368
    2. Abhishek Jain, Krzysztof Pietrzak, Aris Tentes
      Pages 369-382
    3. Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin
      Pages 383-403
  9. Dedicated Encryption I

    1. Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan
      Pages 404-421
    2. Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan
      Pages 422-439
    3. Vipul Goyal, Virendra Kumar, Satya Lokam, Mohammad Mahmoody
      Pages 440-457
  10. Security Amplification

    1. Krzysztof Pietrzak, Alon Rosen, Gil Segev
      Pages 458-475
    2. Yevgeniy Dodis, Abhishek Jain, Tal Moran, Daniel Wichs
      Pages 476-493
  11. Resettable and Parallel Zero Knowledge

    1. Sanjam Garg, Rafail Ostrovsky, Ivan Visconti, Akshay Wadia
      Pages 494-511
    2. Kai-Min Chung, Rafael Pass, Wei-Lung Dustin Tseng
      Pages 512-529
    3. Chongwon Cho, Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti
      Pages 530-547
  12. Dedicated Encryption II

    1. Krzysztof Pietrzak
      Pages 548-563
    2. Shafi Goldwasser, Allison Lewko, David A. Wilson
      Pages 564-581
  13. Pseudorandomness II

    1. Benny Applebaum, Andrej Bogdanov, Alon Rosen
      Pages 600-617
    2. Yevgeniy Dodis, Thomas Ristenpart, Salil Vadhan
      Pages 618-635
  14. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.

Keywords

communication complexity concrete security public-key encryption rsa signature secure multiparty computation

Editors and affiliations

  • Ronald Cramer
    • 1
  1. 1.Cryptology Group, CWI Amsterdam; and Mathematical InstituteLeiden University, ,LeidenThe Netherlands

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-28914-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-28913-2
  • Online ISBN 978-3-642-28914-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site