Theory of cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010 : proceedings /

This book constitutes the refereed proceedings of the Seventh Theory of Cryptography Conference, TCC 2010, held in Zurich, Switzerland, February 9-11, 2010. The 33 revised full papers presented together with two invited talks were carefully reviewed and selected from 100 submissions. The papers are...

Full description

Corporate Authors: Theory of Cryptography Conference Zurich, Switzerland)
Other Authors: Theory of Cryptography Conference, Micciancio, Daniele., SpringerLink (Online service)
Format: eBook
Language: English
Published: Berlin ; New York : Springer, ©2010.
Berlin ; New York : [2010]
Physical Description: 1 online resource (xii, 605 pages) : illustrations.
Series: Lecture notes in computer science ; 5978.
LNCS sublibrary. Security and cryptology.
Subjects:
LEADER 11230cam a2201369 a 4500
001 663096339
003 OCoLC
005 20240223121953.0
006 m o d
007 cr cn|||||||||
008 100909s2010 gw a ob 101 0 eng d
019 |a 636076886  |a 757392725  |a 769769781  |a 912407091  |a 964913070  |a 1005786703  |a 1044255433  |a 1056394772  |a 1060869340  |a 1065026090  |a 1067232134  |a 1081201612  |a 1087306364  |a 1112544552 
020 |a 9783642117992 
020 |a 3642117996 
020 |z 9783642117985 
020 |z 3642117988 
024 7 |a 10.1007/978-3-642-11799-2  |2 doi 
028 5 2 |a 12990504 
035 |a (OCoLC)663096339  |z (OCoLC)636076886  |z (OCoLC)757392725  |z (OCoLC)769769781  |z (OCoLC)912407091  |z (OCoLC)964913070  |z (OCoLC)1005786703  |z (OCoLC)1044255433  |z (OCoLC)1056394772  |z (OCoLC)1060869340  |z (OCoLC)1065026090  |z (OCoLC)1067232134  |z (OCoLC)1081201612  |z (OCoLC)1087306364  |z (OCoLC)1112544552 
037 |a 978-3-642-11798-5  |b Springer  |n http://www.springerlink.com 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d CUS  |d OCLCQ  |d GZM  |d VLB  |d E7B  |d OCLCO  |d OCLCQ  |d OCLCA  |d OCLCF  |d BEDGE  |d OHS  |d OCLCO  |d IXA  |d YDXCP  |d OCL  |d OCLCO  |d EBLCP  |d OCLCQ  |d OCLCO  |d DEBSZ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d NUI  |d OCLCO  |d OCLCQ  |d VT2  |d DGU  |d OCLCA  |d UAB  |d ESU  |d OCLCQ  |d IOG  |d OCLCA  |d BUF  |d OCLCO  |d MERER  |d OCLCO  |d CEF  |d CRU  |d TFW  |d OCLCO  |d U3W  |d OCLCO  |d WYU  |d LHU  |d OCLCO  |d OCLCA  |d YOU  |d OCLCO  |d OCLCA  |d OCLCQ  |d OCLCO  |d OL$  |d OCLCQ  |d W2U  |d OCLCQ  |d ERF  |d OCLCQ  |d OCLCA  |d OCLCQ  |d OCLCA  |d EUN  |d OCLCO  |d OCLCQ  |d OCLCO  |d UKAHL  |d COM  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL 
049 |a COM6 
050 4 |a QA76.9.A25  |b T44 2010 
060 4 |a QA 76.9.A25 
066 |c (S 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 004  |2 22 
084 |a SS 4800  |2 rvk 
111 2 |a Theory of Cryptography Conference  |n (7th :  |d 2010 :  |c Zurich, Switzerland) 
245 1 0 |a Theory of cryptography :  |b 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010 : proceedings /  |c Daniele Micciancio (ed.). 
246 3 0 |a TCC 2010. 
260 |a Berlin ;  |a New York :  |b Springer,  |c ©2010. 
264 1 |a Berlin ;  |a New York :  |b Springer,  |c [2010] 
264 4 |c ©2010. 
300 |a 1 online resource (xii, 605 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |b PDF. 
347 |a text file. 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 5978. 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology. 
504 |a Includes bibliographical references and author index. 
505 0 |a Parallel repetition -- Obfuscation -- Multiparty computation -- CCA security -- Threshold cryptography and secret sharing -- Symmetric cryptography -- Key-leakage and tamper-resistance -- Rationality and privacy -- Public-key encryption -- Zero-knowledge. 
588 0 |a Print version record. 
520 |a This book constitutes the refereed proceedings of the Seventh Theory of Cryptography Conference, TCC 2010, held in Zurich, Switzerland, February 9-11, 2010. The 33 revised full papers presented together with two invited talks were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on parallel repetition, obfuscation, multiparty computation, CCA security, threshold cryptography and secret sharing, symmetric cryptography, key-leakage and tamper-resistance, rationality and privacy, public-key encryption, and zero-knowledge. 
650 0 |a Computer security  |v Congresses. 
650 0 |a Data encryption (Computer science)  |v Congresses. 
650 0 |a Cryptography  |v Congresses. 
650 0 |a Computer security. 
650 2 |a Computer Security. 
650 1 0 |a Computer science. 
650 2 0 |a Data encryption (Computer science) 
650 2 2 |a Computer Communication Networks. 
650 2 4 |a Coding and Information Theory. 
650 2 0 |a Computer security. 
650 2 0 |a Data protection. 
650 2 0 |a Computer science  |x Mathematics. 
650 2 4 |a Algorithm Analysis and Problem Complexity. 
650 6 |a Sécurité informatique  |v Congrès. 
650 6 |a Chiffrement (Informatique)  |v Congrès. 
650 6 |a Cryptographie  |v Congrès. 
650 6 |a Sécurité informatique. 
650 7 |a Informatique.  |2 eclas. 
650 7 |a Computer security.  |2 fast. 
650 7 |a Cryptography.  |2 fast. 
650 7 |a Data encryption (Computer science)  |2 fast. 
650 7 |a Kryptologie.  |2 gnd. 
655 2 |a Congress. 
655 7 |a Conference papers and proceedings.  |2 fast. 
655 7 |a Conference papers and proceedings.  |2 lcgft. 
655 7 |a Actes de congrès.  |2 rvmgf. 
655 7 |a Kongress.  |2 swd. 
655 7 |a proceedings (reports)  |2 aat. 
655 7 |a Zürich (2010)  |2 swd. 
700 1 |a Micciancio, Daniele. 
710 2 |a SpringerLink (Online service) 
776 0 8 |i Print version:  |a Theory of Cryptography Conference (7th : 2010 : Zurich, Switzerland).  |t Theory of cryptography.  |d Berlin ; New York : Springer, ©2010  |z 9783642117985  |w (DLC) 2009943559  |w (OCoLC)502033381. 
830 0 |a Lecture notes in computer science ;  |v 5978.  |x 0302-9743. 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology. 
880 0 |6 505-00/(S  |a Parallel repetition. An efficient parallel repetition theorem / Johan Håstad, Rafael Pass, Douglas Wikström, and Krzysztof Pietrzak -- Parallel repetition theorems for interactive arguments / Kai-Min Chung and Feng-Hao Liu -- Almost optimal bounds for direct product threshold theorem / Charanjit S. Jutla -- Obfuscation. On symmetric encryption and point obfuscation / Ran Canetti, Yael Tauman Kalai, Mayank Varia, and Daniel Wichs -- Obfuscation of hyperplane membership / Ran Canetti, Guy N. Rothblum, and Mayank Varia -- Invited talk. Secure computation and its diverse applications / Yuval Ishai -- Multiparty computation. On complete primitives for fairness / Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostrovsky, and Amit Sahai -- On the necessary and sufficient assumptions for UC computation / Ivan Damgård, Jesper Buus Nielsen, and Claudio Orlandi -- From passive to covert security at low cost / Ivan Damgård, Martin Geisler, and Jesper Buus Nielsen -- CCA security. A twist on the Naor-Yung paradigm and its application to efficient CCA-secure encryption from hard search problems / Ronald Cramer, Dennis Hofheinz, and Eike Kiltz -- Two is a crowd? : a black-box separation of one-wayness and security under correlated inputs / Yevgeniy Vahlis -- Threshold cryptography and secret sharing. Efficient, robust and constant-round distributed RSA key generation / Ivan Damgård and Gert Læssøe Mikkelsen -- Threshold decryption and zero-knowledge proofs for lattice-based cryptosystems / Rikke Bendlin and Ivan Damgård -- Ideal hierarchical secret sharing schemes / Oriol Farràs and Carles Padró -- Symmetric cryptography. A hardcore lemma for computational indistinguishability : security amplification for arbitrarily weak PRGs with optimal stretch / Ueli Maurer and Stefano Tessaro -- On related-secret pseudorandomness / David Goldenberg and Moses Liskov -- A domain extender for the ideal cipher / Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, and Yannick Seurin -- Delayed-key message authentication for streams / Marc Fischlin and Anja Lehmann -- Key-leakage and tamper-resistance. Founding cryptography on tamper-proof hardware tokens / Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, and Akshay Wadia -- Truly efficient string oblivious transfer using resettable tamper-proof tokens / Vladimir Kolesnikov -- Leakage-resilient signatures / Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, and Guy N. Rothblum -- Public-key encryption schemes with auxiliary inputs / Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kalai, Chris Peikert, and Vinod Vaikuntanathan -- Public-key cryptographic primitives provably as secure as subset sum / Vadim Lyubashevsky, Adriana Palacio, and Gil Segev -- Rationality and privacy. Rationality in the full-information model / Ronen Gradwohl -- Efficient rational secret sharing in standard communication networks / Georg Fuchsbauer, Jonathan Katz, and David Naccache -- Bounds on the sample complexity for private learning and private data release / Amos Beimel, Shiva Prasad Kasiviswanathan, and Kobbi Nissim -- Public-key encryption. New techniques for dual system encryption and fully secure HIBE with short ciphertexts / Allison Lewko and Brent Waters -- Robust encryption / Michel Abdalla, Mihir Bellare, and Gregory Neven -- Invited talk. Privacy-enhancing cryptography : from theory into practice / Jan Camenisch -- Zero-knowledge. Concise mercurial vector commitments and independent zero-knowledge sets with short proofs / Benoît Libert and Moti Yung -- Eye for an eye : efficient concurrent zero-knowledge in the timing model / Rafael Pass, Wei-Lung Dustin Tseng, and Muthuramakrishnan Venkitasubramaniam -- Efficiency preserving transformations for concurrent non-malleable zero knowledge / Rafail Ostrovsky, Omkant Pandey, and Ivan Visconti -- Efficiency limitations for V-protocols for group homomorphisms / Endre Bangerter, Jan Camenisch, and Stephan Krenn -- Composition of zero-knowledge proofs with efficient provers / Eleanor Birrell and Salil Vadhan -- Private coins versus public coins in zero-knowledge proof systems / Rafael Pass and Muthuramakrishnan Venkitasubramaniam. 
907 |a .b30270662  |b multi  |c -  |d 100917  |e 240401 
998 |a (3)cue  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g gw   |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Comp, in 2022.12 
948 |a MARCIVE Comp, 09/2021 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Comp, 2018.12 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE Comp, 2017.10 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug 5, 2017 
933 |a Marcive found issue: "650 24   |a Algorithm Analysis and Problem Complexity." 
933 |a Marcive found issue: "650 24   |a Coding and Information Theory." 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2022.12 
995 |a Loaded with m2btab.ltiac in 2021.09 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2018.12 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.10 
995 |a Loaded with m2btab.ltiac in 2017.08 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.ltiac in 2016 
995 |a OCLC offline update by CMU 
995 |a Loaded with m2btab.auth in 2021.07 
995 |a Loaded with m2btab.auth in 2021.07 
995 |a Loaded with m2btab.auth in 2021.07 
995 |a Loaded with m2btab.auth in 2024.03 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i150255111  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-642-11799-2  |3 SpringerLink  |z Click here for access