Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006 : Proceedings

Front Cover
Springer Science & Business Media, Feb 27, 2006 - Business & Economics - 616 pages

This book constitutes the refereed proceedings of the Third Theory of Cryptography Conference, TCC 2006, held in March 2006. The 31 revised full papers presented were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on zero-knowledge, primitives, assumptions and models, the bounded-retrieval model, privacy, secret sharing and multi-party computation, universally-composible security, one-way functions and friends, and pseudo-random functions and encryption.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

ZeroKnowledge
1
Interactive ZeroKnowledge with Restricted Random Oracles
21
Noninteractive ZeroKnowledge from Homomorphic Encryption
41
Primitives
60
Efficient Blind and Partially Blind Signatures Without Random Oracles
80
Key Exchange Using Passwords and Long Keys
100
Minimal Assumptions and Efficient
120
Efficient CollisionResistant Hashing from WorstCase Assumptions
145
UniversallyComposible Security
343
Games and the Impossibility of Realizable Ideal Functionality
360
Universally Composable Symbolic Analysis of Mutual Authentication
380
Resource Fairness and Composability of Cryptographic Protocols
404
OneWay Functions and Friends
429
A Simple
443
On the Complexity of Parallel Hardness Amplification for OneWay
462
Secret Sharing and Multiparty Computation II
482

On Error Correction in the Exponent
167
On the Relation Between the Ideal Cipher and the Random Oracle
184
The BoundedRetrieval Model
207
Perfectly Secure Password Protocols in the Bounded Retrieval Model
225
Privacy
243
Calibrating Noise to Sensitivity in Private Data Analysis
265
Secret Sharing and Multiparty Computation
285
Efficient Multiparty Computation with Dispute Control
305
RoundOptimal and Efficient Verifiable Secret Sharing
329
Secure Computation with Partial Message Loss
502
Communication Efficient Secure Linear Algebra
522
Threshold and Proactive PseudoRandom Permutations
542
PseudoRandom Functions and Encryption
559
ChosenCiphertext Security from TagBased Encryption
581
Separating Sources for Encryption and Secret Sharing
601
Author Index
617
Copyright

Other editions - View all

Common terms and phrases