Theory of cryptography: 11th international conference, TCC 2014, San Diego, CA, USA, February 24 - 26, 2014 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer Berlin
2014
|
Schriftenreihe: | Lecture notes in computer science
8349 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XV, 738 S. graph. Darst. |
ISBN: | 3642542417 9783642542411 |
Internformat
MARC
LEADER | 00000nam a22000008cb4500 | ||
---|---|---|---|
001 | BV041639667 | ||
003 | DE-604 | ||
005 | 20140403 | ||
007 | t | ||
008 | 140210s2014 gw d||| |||| 10||| eng d | ||
015 | |a 14,N05 |2 dnb | ||
016 | 7 | |a 1046583964 |2 DE-101 | |
020 | |a 3642542417 |9 3-642-54241-7 | ||
020 | |a 9783642542411 |c Pb. : EUR 93.09 (DE) (freier Pr.), EUR 95.70 (AT) (freier Pr.), sfr 116.00 (freier Pr.) |9 978-3-642-54241-1 | ||
024 | 3 | |a 9783642542411 | |
035 | |a (OCoLC)879242999 | ||
035 | |a (DE-599)DNB1046583964 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-83 |a DE-11 |a DE-91G | ||
084 | |a SS 4800 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Theory of cryptography |b 11th international conference, TCC 2014, San Diego, CA, USA, February 24 - 26, 2014 ; proceedings |c Yehuda Lindell (ed.) |
263 | |a 201402 | ||
264 | 1 | |a Berlin [u.a.] |b Springer Berlin |c 2014 | |
300 | |a XV, 738 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8349 | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2014 |z San Diego Calif. |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Lindell, Yehuda |d 1971- |e Sonstige |0 (DE-588)1031893946 |4 oth | |
711 | 2 | |a Theory of Cryptography Conference |n 11 |d 2014 |c San Diego, Calif. |j Sonstige |0 (DE-588)1047316919 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-54242-8 |
830 | 0 | |a Lecture notes in computer science |v 8349 |w (DE-604)BV000000607 |9 8349 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4570853&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027080496&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027080496 |
Datensatz im Suchindex
_version_ | 1806327062126919680 |
---|---|
adam_text |
TABLE OF CONTENTS
OBFUSCATION
VIRTUAL BLACK-BOX OBFUSCATION FOR ALL CIRCUITS VIA GENERIC GRADED
ENCODING 1
ZVIKA BRAKERSKI AND GUY N. ROTHBLUM
OBFUSCATION FOR EVASIVE FUNCTIONS 26
BOAZ BARAK, NIR BITANSKY, RAN CANETTI, YAEL TAUMAN KALAI,
OMER PANETH, AND AMIT SAHAI
ON EXTRACTABILITY OBFUSCATION 52
ELETTE BOYLE, KAI-MIN CHUNG, AND B.AFAEL PASS
APPLICATIONS OF OBFUSCATION
TWO-ROUND SECURE MPC FROM INDISTINGUISHABILITY OBFUSCATION 74
SANJAM GARG, CRAIG GENTRY, SHAI HALEVI, AND MARIANA B.AYKOVA
CHOSEN CIPHERTEXT SECURITY VIA POINT OBFUSCATION 95
TAKAHIRO MATSUDA AND GOICHIRO HANAOKA
ZERO KNOWLEDGE
PROBABILISTICALLY CHECKABLE PROOFS OF PROXIMITY WITH ZERO-KNOWLEDGE . .
121
YUVAL ISHAI AND MOR WEISS
ACHIEVING CONSTANT ROUND LEAKAGE-RESILIENT ZERO-KNOWLEDGE 146
OMKANT PANDEY
STATISTICAL CONCURRENT NON-MALLEABLE ZERO KNOWLEDGE 167
CLAUDIO ORLANDI, B.AFAIL OSTROVSKY, VANISHREE RAO, AMIT SAHAI, AND
IVAN VISCONTI
4-ROUND RESETTABLY-SOUND ZERO KNOWLEDGE 192
KAI-MIN CHUNG, R.AFAIL OSTROVSKY, R.AFAEL PASS,
MUTHURAMAKRISHNAN VENKITASUBRAMANIAM, AND IVAN VISCONTI
BLACK-BOX SEPARATIONS
CAN OPTIMALLY-FAIR COIN TOSSING BE BASED ON ONE-WAY FUNCTIONS? . 217
DANA DACHMAN-SOLED, MOHAMMAD MAHMOODY, AND TAL MALKIN
HTTP://D-NB.INFO/1046583964
XIV TABLE OF CONTENTS
ON THE POWER OF PUBLIC-KEY ENCRYPTION IN SECURE COMPUTATION 240
MOHAMMAD MAHMOODY, HEMANTA K. MAJI, AND MANOJ PRABHAKARAN
ON THE IMPOSSIBILITY OF BASING PUBLIC-COIN ONE-WAY PERMUTATIONS ON
TRAPDOOR PERMUTATIONS 265
TAKAHIRO MATSUDA
SECURE COMPUTATION
TOWARDS CHARACTERIZING COMPLETE FAIRNESS IN SECURE TWO-PARTY
COMPUTATION 291
GILAD ASHAROV
ON THE CRYPTOGRAPHIC COMPLEXITY OF THE WORST FUNCTIONS 317
AMOS BEIMEL, YUVAL ISHAI, B.ANJIT KUMARESAN, AND EYAL KUSHILEVITZ
CONSTANT-ROUND BLACK-BOX CONSTRUCTION OF COMPOSABLE MULTI-PARTY
COMPUTATION PROTOCOL 343
SUSUMU KIYOSHIMA, YOSHIFUMI MANABE, AND TATSUAKI OKAMOTO
ONE-SIDED ADAPTIVELY SECURE TWO-PARTY COMPUTATION 368
CARMIT HAZAY AND ARPITA PATRA
MULTI-LINEAR SECRET-SHARING SCHEMES 394
AMOS BEIMEL, ANER BEN-EFRAIM, CARLES PADRO, AND ILYA TYOMKIN
BROADCAST AMPLIFICATION 419
MARTIN HIRT, UELI MAURER, AND PAVEL RAYKOV
CODING AND CRYPTOGRAPHIC APPLICATIONS
NON-MALLEABLE CODING AGAINST BIT-WISE AND SPLIT-STATE TAMPERING 440
MAHDI CHERAGHCHI AND VENKATESAN GURUSWAMI
CONTINUOUS NON-MALLEABLE CODES 465
SEBASTIAN FAUST, PRATYAY MUKHERJEE, JESPER BUUS NIELSEN, AND
DANIELE VENTURI
LOCALLY UPDATABLE AND LOCALLY DECODABLE CODES 489
NISHANTH CHANDRAN, BHAVANA KANUKURTHI, AND R.AFAIL OSTROVSKY
LEAKAGE
LEAKAGE RESILIENT FULLY HOMOMORPHIC ENCRYPTION 515
ALEXANDRA BERKOFF AND FENG-HAO LIU
SECURING CIRCUITS AND PROTOCOLS AGAINST 1/ POLY(FC) TAMPERING RATE .
540
DANA DACHMAN-SOLED AND YAEL TAUMAN KALAI
TABLE OF CONTENTS XV
HOW TO FAKE AUXILIARY INPUT 566
DIMITAR JETCHEV AND KRZYSZTOF PIETRZAK
ENCRYPTION
STANDARD VERSUS SELECTIVE OPENING SECURITY: SEPARATION AND EQUIVALENCE
RESULTS 591
DENNIS HOFHEINZ AND ANDY R.UPP
DUAL SYSTEM ENCRYPTION VIA PREDICATE ENCODINGS 616
HOETECK WEE
HARDWARE-AIDED SECURE PROTOCOLS
(EFFICIENT) UNIVERSALLY COMPOSABLE OBLIVIOUS TRANSFER USING A MINIMAL
NUMBER OF STATELESS TOKENS 638
SEUNG GEOL CHOI, JONATHAN KATZ, DOMINIQUE SCHRODER,
ARKADY YERUKHIMOVICH, AND HONG-SHENG ZHOU
LOWER BOUNDS IN THE HARDWARE TOKEN MODEL 663
SHASHANK AGRAWAL, PRABHANJAN ANANTH, VIPUL GOYAL,
MANOJ PRABHAKARAN, AND ALON ROSEN
ENCRYPTION AND SIGNATURES
UNIFIED, MINIMAL AND SELECTIVELY R.ANDOMIZABLE STRUCTURE-PRESERVING
SIGNATURES 688
MASAYUKI ABE, JENS GROTH, MIYAKO OHKUBO, AND MEHDI TIBOUCHI
ON THE IMPOSSIBILITY OF STRUCTURE-PRESERVING DETERMINISTIC
PRIMITIVES 713
MASAYUKI ABE, JAN CAMENISEH, RAFAEL DOWSLEY, AND
MARIA DUBOVITSKAYA
AUTHOR INDEX
739 |
any_adam_object | 1 |
author_GND | (DE-588)1031893946 |
building | Verbundindex |
bvnumber | BV041639667 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)879242999 (DE-599)DNB1046583964 |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000008cb4500</leader><controlfield tag="001">BV041639667</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140403</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">140210s2014 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">14,N05</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1046583964</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642542417</subfield><subfield code="9">3-642-54241-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642542411</subfield><subfield code="c">Pb. : EUR 93.09 (DE) (freier Pr.), EUR 95.70 (AT) (freier Pr.), sfr 116.00 (freier Pr.)</subfield><subfield code="9">978-3-642-54241-1</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642542411</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)879242999</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1046583964</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Theory of cryptography</subfield><subfield code="b">11th international conference, TCC 2014, San Diego, CA, USA, February 24 - 26, 2014 ; proceedings</subfield><subfield code="c">Yehuda Lindell (ed.)</subfield></datafield><datafield tag="263" ind1=" " ind2=" "><subfield code="a">201402</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer Berlin</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 738 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8349</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2014</subfield><subfield code="z">San Diego Calif.</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lindell, Yehuda</subfield><subfield code="d">1971-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1031893946</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Theory of Cryptography Conference</subfield><subfield code="n">11</subfield><subfield code="d">2014</subfield><subfield code="c">San Diego, Calif.</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1047316919</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-54242-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8349</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">8349</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4570853&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027080496&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027080496</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2014 San Diego Calif. gnd-content |
genre_facet | Konferenzschrift 2014 San Diego Calif. |
id | DE-604.BV041639667 |
illustrated | Illustrated |
indexdate | 2024-08-03T01:15:25Z |
institution | BVB |
institution_GND | (DE-588)1047316919 |
isbn | 3642542417 9783642542411 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027080496 |
oclc_num | 879242999 |
open_access_boolean | |
owner | DE-83 DE-11 DE-91G DE-BY-TUM |
owner_facet | DE-83 DE-11 DE-91G DE-BY-TUM |
physical | XV, 738 S. graph. Darst. |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer Berlin |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Theory of cryptography 11th international conference, TCC 2014, San Diego, CA, USA, February 24 - 26, 2014 ; proceedings Yehuda Lindell (ed.) 201402 Berlin [u.a.] Springer Berlin 2014 XV, 738 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 8349 Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2014 San Diego Calif. gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Lindell, Yehuda 1971- Sonstige (DE-588)1031893946 oth Theory of Cryptography Conference 11 2014 San Diego, Calif. Sonstige (DE-588)1047316919 oth Erscheint auch als Online-Ausgabe 978-3-642-54242-8 Lecture notes in computer science 8349 (DE-604)BV000000607 8349 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4570853&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027080496&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Theory of cryptography 11th international conference, TCC 2014, San Diego, CA, USA, February 24 - 26, 2014 ; proceedings Lecture notes in computer science Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)1071861417 |
title | Theory of cryptography 11th international conference, TCC 2014, San Diego, CA, USA, February 24 - 26, 2014 ; proceedings |
title_auth | Theory of cryptography 11th international conference, TCC 2014, San Diego, CA, USA, February 24 - 26, 2014 ; proceedings |
title_exact_search | Theory of cryptography 11th international conference, TCC 2014, San Diego, CA, USA, February 24 - 26, 2014 ; proceedings |
title_full | Theory of cryptography 11th international conference, TCC 2014, San Diego, CA, USA, February 24 - 26, 2014 ; proceedings Yehuda Lindell (ed.) |
title_fullStr | Theory of cryptography 11th international conference, TCC 2014, San Diego, CA, USA, February 24 - 26, 2014 ; proceedings Yehuda Lindell (ed.) |
title_full_unstemmed | Theory of cryptography 11th international conference, TCC 2014, San Diego, CA, USA, February 24 - 26, 2014 ; proceedings Yehuda Lindell (ed.) |
title_short | Theory of cryptography |
title_sort | theory of cryptography 11th international conference tcc 2014 san diego ca usa february 24 26 2014 proceedings |
title_sub | 11th international conference, TCC 2014, San Diego, CA, USA, February 24 - 26, 2014 ; proceedings |
topic | Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Kryptologie Konferenzschrift 2014 San Diego Calif. |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4570853&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027080496&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT lindellyehuda theoryofcryptography11thinternationalconferencetcc2014sandiegocausafebruary24262014proceedings AT theoryofcryptographyconferencesandiegocalif theoryofcryptography11thinternationalconferencetcc2014sandiegocausafebruary24262014proceedings |