Theory of cryptography 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010 : proceedings /
This book constitutes the refereed proceedings of the Seventh Theory of Cryptography Conference, TCC 2010, held in Zurich, Switzerland, February 9-11, 2010. The 33 revised full papers presented together with two invited talks were carefully reviewed and selected from 100 submissions. The papers are...
Corporate Authors: | Theory of Cryptography Conference Zurich, Switzerland) |
---|---|
Other Authors: | Theory of Cryptography Conference, Micciancio, Daniele., SpringerLink (Online service) |
Format: | eBook |
Language: | English |
Published: |
Berlin ; New York :
Springer,
©2010.
Berlin ; New York : [2010] |
Physical Description: |
1 online resource (xii, 605 pages) : illustrations. |
Series: |
Lecture notes in computer science ;
5978. LNCS sublibrary. Security and cryptology. |
Subjects: |
LEADER | 11230cam a2201369 a 4500 | ||
---|---|---|---|
001 | 663096339 | ||
003 | OCoLC | ||
005 | 20240223121953.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 100909s2010 gw a ob 101 0 eng d | ||
019 | |a 636076886 |a 757392725 |a 769769781 |a 912407091 |a 964913070 |a 1005786703 |a 1044255433 |a 1056394772 |a 1060869340 |a 1065026090 |a 1067232134 |a 1081201612 |a 1087306364 |a 1112544552 | ||
020 | |a 9783642117992 | ||
020 | |a 3642117996 | ||
020 | |z 9783642117985 | ||
020 | |z 3642117988 | ||
024 | 7 | |a 10.1007/978-3-642-11799-2 |2 doi | |
028 | 5 | 2 | |a 12990504 |
035 | |a (OCoLC)663096339 |z (OCoLC)636076886 |z (OCoLC)757392725 |z (OCoLC)769769781 |z (OCoLC)912407091 |z (OCoLC)964913070 |z (OCoLC)1005786703 |z (OCoLC)1044255433 |z (OCoLC)1056394772 |z (OCoLC)1060869340 |z (OCoLC)1065026090 |z (OCoLC)1067232134 |z (OCoLC)1081201612 |z (OCoLC)1087306364 |z (OCoLC)1112544552 | ||
037 | |a 978-3-642-11798-5 |b Springer |n http://www.springerlink.com | ||
040 | |a GW5XE |b eng |e pn |c GW5XE |d CUS |d OCLCQ |d GZM |d VLB |d E7B |d OCLCO |d OCLCQ |d OCLCA |d OCLCF |d BEDGE |d OHS |d OCLCO |d IXA |d YDXCP |d OCL |d OCLCO |d EBLCP |d OCLCQ |d OCLCO |d DEBSZ |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d NUI |d OCLCO |d OCLCQ |d VT2 |d DGU |d OCLCA |d UAB |d ESU |d OCLCQ |d IOG |d OCLCA |d BUF |d OCLCO |d MERER |d OCLCO |d CEF |d CRU |d TFW |d OCLCO |d U3W |d OCLCO |d WYU |d LHU |d OCLCO |d OCLCA |d YOU |d OCLCO |d OCLCA |d OCLCQ |d OCLCO |d OL$ |d OCLCQ |d W2U |d OCLCQ |d ERF |d OCLCQ |d OCLCA |d OCLCQ |d OCLCA |d EUN |d OCLCO |d OCLCQ |d OCLCO |d UKAHL |d COM |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL | ||
049 | |a COM6 | ||
050 | 4 | |a QA76.9.A25 |b T44 2010 | |
060 | 4 | |a QA 76.9.A25 | |
066 | |c (S | ||
072 | 7 | |a URY |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | 4 | |a 004 |2 22 |
084 | |a SS 4800 |2 rvk | ||
111 | 2 | |a Theory of Cryptography Conference |n (7th : |d 2010 : |c Zurich, Switzerland) | |
245 | 1 | 0 | |a Theory of cryptography : |b 7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010 : proceedings / |c Daniele Micciancio (ed.). |
246 | 3 | 0 | |a TCC 2010. |
260 | |a Berlin ; |a New York : |b Springer, |c ©2010. | ||
264 | 1 | |a Berlin ; |a New York : |b Springer, |c [2010] | |
264 | 4 | |c ©2010. | |
300 | |a 1 online resource (xii, 605 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
347 | |b PDF. | ||
347 | |a text file. | ||
490 | 1 | |a Lecture notes in computer science, |x 0302-9743 ; |v 5978. | |
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology. | |
504 | |a Includes bibliographical references and author index. | ||
505 | 0 | |a Parallel repetition -- Obfuscation -- Multiparty computation -- CCA security -- Threshold cryptography and secret sharing -- Symmetric cryptography -- Key-leakage and tamper-resistance -- Rationality and privacy -- Public-key encryption -- Zero-knowledge. | |
588 | 0 | |a Print version record. | |
520 | |a This book constitutes the refereed proceedings of the Seventh Theory of Cryptography Conference, TCC 2010, held in Zurich, Switzerland, February 9-11, 2010. The 33 revised full papers presented together with two invited talks were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on parallel repetition, obfuscation, multiparty computation, CCA security, threshold cryptography and secret sharing, symmetric cryptography, key-leakage and tamper-resistance, rationality and privacy, public-key encryption, and zero-knowledge. | ||
650 | 0 | |a Computer security |v Congresses. | |
650 | 0 | |a Data encryption (Computer science) |v Congresses. | |
650 | 0 | |a Cryptography |v Congresses. | |
650 | 0 | |a Computer security. | |
650 | 2 | |a Computer Security. | |
650 | 1 | 0 | |a Computer science. |
650 | 2 | 0 | |a Data encryption (Computer science) |
650 | 2 | 2 | |a Computer Communication Networks. |
650 | 2 | 4 | |a Coding and Information Theory. |
650 | 2 | 0 | |a Computer security. |
650 | 2 | 0 | |a Data protection. |
650 | 2 | 0 | |a Computer science |x Mathematics. |
650 | 2 | 4 | |a Algorithm Analysis and Problem Complexity. |
650 | 6 | |a Sécurité informatique |v Congrès. | |
650 | 6 | |a Chiffrement (Informatique) |v Congrès. | |
650 | 6 | |a Cryptographie |v Congrès. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a Informatique. |2 eclas. | |
650 | 7 | |a Computer security. |2 fast. | |
650 | 7 | |a Cryptography. |2 fast. | |
650 | 7 | |a Data encryption (Computer science) |2 fast. | |
650 | 7 | |a Kryptologie. |2 gnd. | |
655 | 2 | |a Congress. | |
655 | 7 | |a Conference papers and proceedings. |2 fast. | |
655 | 7 | |a Conference papers and proceedings. |2 lcgft. | |
655 | 7 | |a Actes de congrès. |2 rvmgf. | |
655 | 7 | |a Kongress. |2 swd. | |
655 | 7 | |a proceedings (reports) |2 aat. | |
655 | 7 | |a Zürich (2010) |2 swd. | |
700 | 1 | |a Micciancio, Daniele. | |
710 | 2 | |a SpringerLink (Online service) | |
776 | 0 | 8 | |i Print version: |a Theory of Cryptography Conference (7th : 2010 : Zurich, Switzerland). |t Theory of cryptography. |d Berlin ; New York : Springer, ©2010 |z 9783642117985 |w (DLC) 2009943559 |w (OCoLC)502033381. |
830 | 0 | |a Lecture notes in computer science ; |v 5978. |x 0302-9743. | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. | |
880 | 0 | |6 505-00/(S |a Parallel repetition. An efficient parallel repetition theorem / Johan Håstad, Rafael Pass, Douglas Wikström, and Krzysztof Pietrzak -- Parallel repetition theorems for interactive arguments / Kai-Min Chung and Feng-Hao Liu -- Almost optimal bounds for direct product threshold theorem / Charanjit S. Jutla -- Obfuscation. On symmetric encryption and point obfuscation / Ran Canetti, Yael Tauman Kalai, Mayank Varia, and Daniel Wichs -- Obfuscation of hyperplane membership / Ran Canetti, Guy N. Rothblum, and Mayank Varia -- Invited talk. Secure computation and its diverse applications / Yuval Ishai -- Multiparty computation. On complete primitives for fairness / Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostrovsky, and Amit Sahai -- On the necessary and sufficient assumptions for UC computation / Ivan Damgård, Jesper Buus Nielsen, and Claudio Orlandi -- From passive to covert security at low cost / Ivan Damgård, Martin Geisler, and Jesper Buus Nielsen -- CCA security. A twist on the Naor-Yung paradigm and its application to efficient CCA-secure encryption from hard search problems / Ronald Cramer, Dennis Hofheinz, and Eike Kiltz -- Two is a crowd? : a black-box separation of one-wayness and security under correlated inputs / Yevgeniy Vahlis -- Threshold cryptography and secret sharing. Efficient, robust and constant-round distributed RSA key generation / Ivan Damgård and Gert Læssøe Mikkelsen -- Threshold decryption and zero-knowledge proofs for lattice-based cryptosystems / Rikke Bendlin and Ivan Damgård -- Ideal hierarchical secret sharing schemes / Oriol Farràs and Carles Padró -- Symmetric cryptography. A hardcore lemma for computational indistinguishability : security amplification for arbitrarily weak PRGs with optimal stretch / Ueli Maurer and Stefano Tessaro -- On related-secret pseudorandomness / David Goldenberg and Moses Liskov -- A domain extender for the ideal cipher / Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, and Yannick Seurin -- Delayed-key message authentication for streams / Marc Fischlin and Anja Lehmann -- Key-leakage and tamper-resistance. Founding cryptography on tamper-proof hardware tokens / Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, and Akshay Wadia -- Truly efficient string oblivious transfer using resettable tamper-proof tokens / Vladimir Kolesnikov -- Leakage-resilient signatures / Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, and Guy N. Rothblum -- Public-key encryption schemes with auxiliary inputs / Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kalai, Chris Peikert, and Vinod Vaikuntanathan -- Public-key cryptographic primitives provably as secure as subset sum / Vadim Lyubashevsky, Adriana Palacio, and Gil Segev -- Rationality and privacy. Rationality in the full-information model / Ronen Gradwohl -- Efficient rational secret sharing in standard communication networks / Georg Fuchsbauer, Jonathan Katz, and David Naccache -- Bounds on the sample complexity for private learning and private data release / Amos Beimel, Shiva Prasad Kasiviswanathan, and Kobbi Nissim -- Public-key encryption. New techniques for dual system encryption and fully secure HIBE with short ciphertexts / Allison Lewko and Brent Waters -- Robust encryption / Michel Abdalla, Mihir Bellare, and Gregory Neven -- Invited talk. Privacy-enhancing cryptography : from theory into practice / Jan Camenisch -- Zero-knowledge. Concise mercurial vector commitments and independent zero-knowledge sets with short proofs / Benoît Libert and Moti Yung -- Eye for an eye : efficient concurrent zero-knowledge in the timing model / Rafael Pass, Wei-Lung Dustin Tseng, and Muthuramakrishnan Venkitasubramaniam -- Efficiency preserving transformations for concurrent non-malleable zero knowledge / Rafail Ostrovsky, Omkant Pandey, and Ivan Visconti -- Efficiency limitations for V-protocols for group homomorphisms / Endre Bangerter, Jan Camenisch, and Stephan Krenn -- Composition of zero-knowledge proofs with efficient provers / Eleanor Birrell and Salil Vadhan -- Private coins versus public coins in zero-knowledge proof systems / Rafael Pass and Muthuramakrishnan Venkitasubramaniam. | |
907 | |a .b30270662 |b multi |c - |d 100917 |e 240401 | ||
998 | |a (3)cue |a cu |b 240227 |c m |d z |e - |f eng |g gw |h 0 |i 2 | ||
948 | |a MARCIVE Overnight, in 2024.03 | ||
948 | |a MARCIVE Comp, in 2022.12 | ||
948 | |a MARCIVE Comp, 09/2021 | ||
948 | |a MARCIVE Over, 07/2021 | ||
948 | |a MARCIVE Comp, 2018.12 | ||
948 | |a MARCIVE Comp, 2018.05 | ||
948 | |a MARCIVE Comp, 2017.10 | ||
948 | |a MARCIVE August, 2017 | ||
948 | |a MARCIVE extract Aug 5, 2017 | ||
933 | |a Marcive found issue: "650 24 |a Algorithm Analysis and Problem Complexity." | ||
933 | |a Marcive found issue: "650 24 |a Coding and Information Theory." | ||
994 | |a 92 |b COM | ||
995 | |a Loaded with m2btab.ltiac in 2024.03 | ||
995 | |a Loaded with m2btab.elec in 2024.02 | ||
995 | |a Loaded with m2btab.ltiac in 2022.12 | ||
995 | |a Loaded with m2btab.ltiac in 2021.09 | ||
995 | |a Loaded with m2btab.ltiac in 2021.07 | ||
995 | |a Loaded with m2btab.elec in 2021.06 | ||
995 | |a Loaded with m2btab.ltiac in 2018.12 | ||
995 | |a Loaded with m2btab.ltiac in 2018.06 | ||
995 | |a Loaded with m2btab.ltiac in 2017.10 | ||
995 | |a Loaded with m2btab.ltiac in 2017.08 | ||
995 | |a Loaded with m2btab.elec in 2016 | ||
995 | |a Loaded with m2btab.elec in 2016 | ||
995 | |a Loaded with m2btab.ltiac in 2016 | ||
995 | |a OCLC offline update by CMU | ||
995 | |a Loaded with m2btab.auth in 2021.07 | ||
995 | |a Loaded with m2btab.auth in 2021.07 | ||
995 | |a Loaded with m2btab.auth in 2021.07 | ||
995 | |a Loaded with m2btab.auth in 2024.03 | ||
999 | |e z | ||
999 | |a cue | ||
989 | |d cueme |e - - |f - - |g - |h 0 |i 0 |j 200 |k 240227 |l $0.00 |m |n - - |o - |p 0 |q 0 |t 0 |x 0 |w SpringerLink |1 .i150255111 |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-642-11799-2 |3 SpringerLink |z Click here for access |