Theory of cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
7785 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XI, 724 S. graph. Darst. |
ISBN: | 9783642365935 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040806512 | ||
003 | DE-604 | ||
005 | 20130328 | ||
007 | t| | ||
008 | 130308s2013 gw d||| |||| 10||| eng d | ||
016 | 7 | |a 103017069X |2 DE-101 | |
020 | |a 9783642365935 |9 978-3-642-36593-5 | ||
035 | |a (OCoLC)835404779 | ||
035 | |a (DE-599)DNB103017069X | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-11 |a DE-83 |a DE-91G | ||
082 | 0 | |a 005.82 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Theory of cryptography |b 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings |c Amit Sahai ... (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a XI, 724 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7785 | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Tokio |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Sahai, Amit |4 edt | |
711 | 2 | |a Theory of Cryptography Conference |n 10 |d 2013 |c Tokio |j Sonstige |0 (DE-588)1032138696 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-36594-2 |
830 | 0 | |a Lecture notes in computer science |v 7785 |w (DE-604)BV000000607 |9 7785 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4242618&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025786499&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025786499 |
Datensatz im Suchindex
_version_ | 1820875447854956544 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
OVERCOMING WEAK EXPECTATIONS 1
YEVGENIY DODIS AND YU YU
A COUNTEREXAMPLE TO THE CHAIN RULE FOR CONDITIONAL HILL ENTROPY. AND
WHAT DENIABLE ENCRYPTION HAS TO DO WITH IT 23
STEPHAN KRENN, KRZYSZTOF PIETRZAK, AND AKSHAY WADIA
HARDNESS PRESERVING REDUCTIONS VIA CUCKOO HASHING 40
ITAY BERMAN, IFTACH HAITNER, ILAN KOMARGODSKI, AND MONI NAOR
CONCURRENT ZERO KNOWLEDGE IN THE BOUNDED PLAYER MODEL 60
VIPUL GOYAL, ABHISHEK JAIN, RAFAIL OSTROVSKY, SILAS RICHELSON, AND IVAN
VISCONTI
PUBLIC-COIN CONCURRENT ZERO-KNOWLEDGE IN THE GLOBAL HASH MODEL . 80
RAN CANETTI, HUIJIA LIN, AND OMER PANETH
SUCCINCT MALLEABLE NIZKS AND AN APPLICATION TO COMPACT SHUFFLES 100
MELISSA CHASE, MARKULF KOHLWEISS, ANNA LYSYANSKAYA. AND SARAH MEIKLEJOHN
ENCRYPTED MESSAGES FROM THE HEIGHTS OF CRYPTOMANIA 120
CRAIG GENTRY
ATTRIBUTE-BASED FUNCTIONAL ENCRYPTION ON LATTICES 122
XAVIER BOYEN
WHEN HOMOMORPHISM BECOMES A LIABILITY 143
ZVIKA BRAKERSKI
GARBLING XOR GATES "FOR FREE" IN THE STANDARD MODEL 162
BENNY APPLEBAUM
WHY "FIAT-SHAMIR FOR PROOFS" LACKS A PROOF 182
NIR BITANSKY, DANA DACHMAN-SOLED, SANJAM GARG, ABHISHEK JAIN, YAEL
TAUMAN KALAI, ADRIANA LOPEZ-ALT, AND DANIEL WICHS
ON THE (IN)SECURITY OF FISCHLIN'S PARADIGM 202
PRABHANJAN ANANTH, RAGHAV BHASKAR, VIPUL GOYAL, AND VANISHREE RAO
SIGNATURES OF CORRECT COMPUTATION 222
CHARALAMPOS PAPAMANTHOU, ELAINE SHI, AND ROBERTO TAMASSIA
HTTP://D-NB.INFO/103017069X
IMAGE 2
X TABLE OF CONTENTS
A FULL CHARACTERIZATION OF FUNCTIONS THAT IMPLY FAIR COIN TOSSING AND
RAMIFICATIONS TO FAIRNESS 243
GILAD ASHAROV, YEHUDA LINDELL, AND TAL RABIN
CHARACTERIZING THE CRYPTOGRAPHIC PROPERTIES OF REACTIVE 2-PARTY
FUNCTIONALITIES 263
R. AMZI JEFFS AND MIKE ROSULEK
FEASIBILITY AND COMPLETENESS OF CRYPTOGRAPHIC TASKS IN THE QUANTUM WORLD
281
SERGE FEHR, JONATHAN KATZ, FANG SONG, HONG-SHENG ZHOU, AND VASSILIS
ZIKAS
LANGUAGES WITH EFFICIENT ZERO-KNOWLEDGE PCPS ARE IN SZK 297
MOHAMMAD MAHMOODY AND DAVID XIAO
SUCCINCT NON-INTERACTIVE ARGUMENTS VIA LINEAR INTERACTIVE PROOFS 315 NIR
BITANSKY, ALESSANDRO CHIESA, YUVAL ISHAI, OMER PANETH, AND RAFAIL
OSTROVSKY
UNPROVABLE SECURITY OF PERFECT NIZK AND NON-INTERACTIVE NON-MALLEABLE
COMMITMENTS 334
RAFAEL PASS
SECURE COMPUTATION FOR BIG DATA 355
TAL MALKIN
COMMUNICATION LOCALITY IN SECURE MULTI-PARTY COMPUTATION: HOW TO RUN
SUBLINEAR ALGORITHMS IN A DISTRIBUTED SETTING 356
ELETTE BOYLE, SHAFI GOLDWASSER, AND STEFANO TESSARO
DISTRIBUTED OBLIVIOUS RAM FOR SECURE TWO-PARTY COMPUTATION 377 STEVE LU
AND RAFAIL OSTROVSKY
BLACK-BOX PROOF OF KNOWLEDGE OF PLAINTEXT AND MULTIPARTY COMPUTATION
WITH LOW COMMUNICATION OVERHEAD 397
STEVEN MYERS, MONA SERGI, AND ABHI SHELAT
TESTING THE LIPSCHITZ PROPERTY OVER PRODUCT DISTRIBUTIONS WITH
APPLICATIONS TO DATA PRIVACY 418
KASHYAP DIXIT, MADHAV JHA, SOFYA RASKHODNIKOVA, AND ABHRADEEP THAKURTA
LIMITS ON THE USEFULNESS OF RANDOM ORACLES 437
IFTACH HAITNER, ERAN OMRI, AND HILA ZAROSIM
ANALYZING GRAPHS WITH NODE DIFFERENTIAL PRIVACY 457
SHIVA PRASAD KASIVISWANATHAN, KOBBI NISSIM, SOFYA RASKHODNIKOVA, AND
ADAM SMITH
IMAGE 3
TABLE OF CONTENTS XI
UNIVERSALLY COMPOSABLE SYNCHRONOUS COMPUTATION 477
JONATHAN KATZ, UELI MAURER, BJORN TACKMANN, AND VASSILIS ZIKAS
MULTI-CLIENT NON-INTERACTIVE VERIFIABLE COMPUTATION 499
SEUNG GEOL CHOI, JONATHAN KATZ, RANJIT KUMARESAN, AND CARLOS CID
ON THE FEASIBILITY OF EXTENDING OBLIVIOUS TRANSFER 519
YEHUDA LINDELL AND HILA ZAROSIM
COMPUTATIONAL SOUNDNESS OF COINDUCTIVE SYMBOLIC SECURITY UNDER ACTIVE
ATTACKS 539
MOHAMMAD HAJIABADI AND BRUCE M. KAPRON
REVISITING LOWER AND UPPER BOUNDS FOR SELECTIVE DECOMMITMENTS 559 RAFAIL
OSTROVSKY, VANISHREE RAO, ALESSANDRA SCAFURO, AND IVAN VISCONTI
ON THE CIRCULAR SECURITY OF BIT-ENCRYPTION 579
RON D. ROTHBLUM
CRYPTOGRAPHIC HARDNESS OF RANDOM LOCAL FUNCTIONS - SURVEY 599
BENNY APPLEBAUM
ON THE POWER OF CORRELATED RANDOMNESS IN SECURE COMPUTATION 600
YUVAL ISHAI, EYAL KUSHILEVITZ, SIGURD MELDGAARD, CLAUDIO ORLANDI, AND
ANAT PASKIN-CHERNIAVSKY
CONSTANT-OVERHEAD SECURE COMPUTATION OF BOOLEAN CIRCUITS USING
PREPROCESSING 621
IVAN DAMGARD AND SARAH ZAKARIAS
IMPLEMENTING RESETTABLE UC-FUNCTIONALITIES WITH UNTRUSTED TAMPER-PROOF
HARDWARE-TOKENS 642
NICO DOTTLING, THILO MIE, JDM MIILLER-QUADE, AND TOBIAS NILGES
A COOKBOOK FOR BLACK-BOX SEPARATIONS AND A RECIPE FOR UOWHFS 662 KFIR
BARHUM AND THOMAS HOLENSTEIN
ALGEBRAIC (TRAPDOOR) ONE-WAY FUNCTIONS AND THEIR APPLICATIONS 680 DARIO
CATALANO, DARIO FIORE, ROSARIO GENNARO, AND KONSTANTINOS VAMVOURELLIS
RANDOMNESS-DEPENDENT MESSAGE SECURITY 700
ELEANOR BIRRELL, KAI-MIN CHUNG, RAFAEL PASS, AND SIDHARTH TELANG
ERRATA TO (NEARLY) ROUND-OPTIMAL BLACK-BOX CONSTRUCTIONS OF COMMITMENTS
SECURE AGAINST SELECTIVE OPENING ATTACKS 721
DAVID XIAO
AUTHOR INDEX 723 |
any_adam_object | 1 |
author2 | Sahai, Amit |
author2_role | edt |
author2_variant | a s as |
author_facet | Sahai, Amit |
building | Verbundindex |
bvnumber | BV040806512 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)835404779 (DE-599)DNB103017069X |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040806512</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130328</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">130308s2013 gw d||| |||| 10||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">103017069X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642365935</subfield><subfield code="9">978-3-642-36593-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)835404779</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB103017069X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Theory of cryptography</subfield><subfield code="b">10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings</subfield><subfield code="c">Amit Sahai ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 724 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7785</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Tokio</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sahai, Amit</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Theory of Cryptography Conference</subfield><subfield code="n">10</subfield><subfield code="d">2013</subfield><subfield code="c">Tokio</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1032138696</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-36594-2</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7785</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7785</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4242618&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025786499&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025786499</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Tokio gnd-content |
genre_facet | Konferenzschrift 2013 Tokio |
id | DE-604.BV040806512 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:15:46Z |
institution | BVB |
institution_GND | (DE-588)1032138696 |
isbn | 9783642365935 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025786499 |
oclc_num | 835404779 |
open_access_boolean | |
owner | DE-11 DE-83 DE-91G DE-BY-TUM |
owner_facet | DE-11 DE-83 DE-91G DE-BY-TUM |
physical | XI, 724 S. graph. Darst. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Theory of cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings Amit Sahai ... (ed.) Berlin [u.a.] Springer 2013 XI, 724 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7785 Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Tokio gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Sahai, Amit edt Theory of Cryptography Conference 10 2013 Tokio Sonstige (DE-588)1032138696 oth Erscheint auch als Online-Ausgabe 978-3-642-36594-2 Lecture notes in computer science 7785 (DE-604)BV000000607 7785 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4242618&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025786499&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Theory of cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings Lecture notes in computer science Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)1071861417 |
title | Theory of cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings |
title_auth | Theory of cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings |
title_exact_search | Theory of cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings |
title_full | Theory of cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings Amit Sahai ... (ed.) |
title_fullStr | Theory of cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings Amit Sahai ... (ed.) |
title_full_unstemmed | Theory of cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings Amit Sahai ... (ed.) |
title_short | Theory of cryptography |
title_sort | theory of cryptography 10th theory of cryptography conference tcc 2013 tokyo japan march 3 6 2013 proceedings |
title_sub | 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings |
topic | Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Kryptologie Konferenzschrift 2013 Tokio |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4242618&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025786499&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT sahaiamit theoryofcryptography10ththeoryofcryptographyconferencetcc2013tokyojapanmarch362013proceedings AT theoryofcryptographyconferencetokio theoryofcryptography10ththeoryofcryptographyconferencetcc2013tokyojapanmarch362013proceedings |