Skip to main content
main-content

Über dieses Buch

This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.

Inhaltsverzeichnis

Frontmatter

Secure Computation

2012 | OriginalPaper | Buchkapitel

Computing on Authenticated Data

Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, abhi shelat, Brent Waters

2012 | OriginalPaper | Buchkapitel

Identifying Cheaters without an Honest Majority

Yuval Ishai, Rafail Ostrovsky, Hakan Seyalioglu

2012 | OriginalPaper | Buchkapitel

On the Security of the “Free-XOR” Technique

Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou

2012 | OriginalPaper | Buchkapitel

Secure Two-Party Computation with Low Communication

Ivan Damgård, Sebastian Faust, Carmit Hazay

(Blind) Signatures and Threshold Encryption

2012 | OriginalPaper | Buchkapitel

Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions

Benoît Libert, Moti Yung

2012 | OriginalPaper | Buchkapitel

Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions

Olivier Blazy, David Pointcheval, Damien Vergnaud

2012 | OriginalPaper | Buchkapitel

On the Instantiability of Hash-and-Sign RSA Signatures

Yevgeniy Dodis, Iftach Haitner, Aris Tentes

2012 | OriginalPaper | Buchkapitel

Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures

Jae Hong Seo, Jung Hee Cheon

Zero-Knowledge and Security Models

2012 | OriginalPaper | Buchkapitel

On Efficient Zero-Knowledge PCPs

Yuval Ishai, Mohammad Mahmoody, Amit Sahai

2012 | OriginalPaper | Buchkapitel

Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments

Helger Lipmaa

2012 | OriginalPaper | Buchkapitel

Point Obfuscation and 3-Round Zero-Knowledge

Nir Bitansky, Omer Paneth

2012 | OriginalPaper | Buchkapitel

Confidentiality and Integrity: A Constructive Perspective

Ueli Maurer, Andreas Rüedlinger, Björn Tackmann

Leakage-Resilience

2012 | OriginalPaper | Buchkapitel

Leakage-Resilient Circuits without Computational Assumptions

Stefan Dziembowski, Sebastian Faust

2012 | OriginalPaper | Buchkapitel

A Parallel Repetition Theorem for Leakage Resilience

Zvika Brakerski, Yael Tauman Kalai

2012 | OriginalPaper | Buchkapitel

Leakage-Tolerant Interactive Protocols

Nir Bitansky, Ran Canetti, Shai Halevi

Hash Functions

2012 | OriginalPaper | Buchkapitel

On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction

Avradip Mandal, Jacques Patarin, Yannick Seurin

2012 | OriginalPaper | Buchkapitel

Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry

Dimitar Jetchev, Onur Özen, Martijn Stam

Differential Privacy

2012 | OriginalPaper | Buchkapitel

Lower Bounds in Differential Privacy

Anindya De

2012 | OriginalPaper | Buchkapitel

Iterative Constructions and Private Data Release

Anupam Gupta, Aaron Roth, Jonathan Ullman

Pseudorandomness I

2012 | OriginalPaper | Buchkapitel

From Non-adaptive to Adaptive Pseudorandom Functions

Itay Berman, Iftach Haitner

2012 | OriginalPaper | Buchkapitel

Hardness Preserving Constructions of Pseudorandom Functions

Abhishek Jain, Krzysztof Pietrzak, Aris Tentes

2012 | OriginalPaper | Buchkapitel

Computational Extractors and Pseudorandomness

Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin

Dedicated Encryption I

2012 | OriginalPaper | Buchkapitel

Functional Re-encryption and Collusion-Resistant Obfuscation

Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan

2012 | OriginalPaper | Buchkapitel

How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption

Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan

2012 | OriginalPaper | Buchkapitel

On Black-Box Reductions between Predicate Encryption Schemes

Vipul Goyal, Virendra Kumar, Satya Lokam, Mohammad Mahmoody

Security Amplification

2012 | OriginalPaper | Buchkapitel

Lossy Functions Do Not Amplify Well

Krzysztof Pietrzak, Alon Rosen, Gil Segev

2012 | OriginalPaper | Buchkapitel

Counterexamples to Hardness Amplification beyond Negligible

Yevgeniy Dodis, Abhishek Jain, Tal Moran, Daniel Wichs

Resettable and Parallel Zero Knowledge

2012 | OriginalPaper | Buchkapitel

Resettable Statistical Zero Knowledge

Sanjam Garg, Rafail Ostrovsky, Ivan Visconti, Akshay Wadia

2012 | OriginalPaper | Buchkapitel

The Knowledge Tightness of Parallel Zero-Knowledge

Kai-Min Chung, Rafael Pass, Wei-Lung Dustin Tseng

2012 | OriginalPaper | Buchkapitel

Simultaneously Resettable Arguments of Knowledge

Chongwon Cho, Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti

Dedicated Encryption II

2012 | OriginalPaper | Buchkapitel

Subspace LWE

Krzysztof Pietrzak

2012 | OriginalPaper | Buchkapitel

Bounded-Collusion IBE from Key Homomorphism

Shafi Goldwasser, Allison Lewko, David A. Wilson

2012 | OriginalPaper | Buchkapitel

A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy

Benjamin Fuller, Adam O’Neill, Leonid Reyzin

Pseudorandomness II

2012 | OriginalPaper | Buchkapitel

A Dichotomy for Local Small-Bias Generators

Benny Applebaum, Andrej Bogdanov, Alon Rosen

2012 | OriginalPaper | Buchkapitel

Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources

Yevgeniy Dodis, Thomas Ristenpart, Salil Vadhan

2012 | OriginalPaper | Buchkapitel

Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations

Dario Fiore, Dominique Schröder

Backmatter

Weitere Informationen

Premium Partner

Neuer Inhalt

BranchenIndex Online

Die B2B-Firmensuche für Industrie und Wirtschaft: Kostenfrei in Firmenprofilen nach Lieferanten, Herstellern, Dienstleistern und Händlern recherchieren.

Whitepaper

- ANZEIGE -

Product Lifecycle Management im Konzernumfeld – Herausforderungen, Lösungsansätze und Handlungsempfehlungen

Für produzierende Unternehmen hat sich Product Lifecycle Management in den letzten Jahrzehnten in wachsendem Maße zu einem strategisch wichtigen Ansatz entwickelt. Forciert durch steigende Effektivitäts- und Effizienzanforderungen stellen viele Unternehmen ihre Product Lifecycle Management-Prozesse und -Informationssysteme auf den Prüfstand. Der vorliegende Beitrag beschreibt entlang eines etablierten Analyseframeworks Herausforderungen und Lösungsansätze im Product Lifecycle Management im Konzernumfeld.
Jetzt gratis downloaden!

Bildnachweise