3. TCC 2006:
New York,
NY,
USA
Shai Halevi, Tal Rabin (Eds.):
Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings.
Lecture Notes in Computer Science 3876 Springer 2006, ISBN 3-540-32731-2 BibTeX
Zero-Knowledge
Primitives
Assumptions and Models
The Bounded-Retrieval Model
Privacy
Secret Sharing and Multi-party Computation (I)
- Ivan Damgård, Matthias Fitzi, Eike Kiltz, Jesper Buus Nielsen, Tomas Toft:
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation.
285-304
Electronic Edition (link) BibTeX
- Zuzana Beerliová-Trubíniová, Martin Hirt:
Efficient Multi-party Computation with Dispute Control.
305-328
Electronic Edition (link) BibTeX
- Matthias Fitzi, Juan A. Garay, Shyamnath Gollakota, C. Pandu Rangan, K. Srinathan:
Round-Optimal and Efficient Verifiable Secret Sharing.
329-342
Electronic Edition (link) BibTeX
Universally-Composible Security
- Tal Malkin, Ryan Moriarty, Nikolai Yakovenko:
Generalized Environmental Security from Number Theoretic Assumptions.
343-359
Electronic Edition (link) BibTeX
- Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov:
Games and the Impossibility of Realizable Ideal Functionality.
360-379
Electronic Edition (link) BibTeX
- Ran Canetti, Jonathan Herzog:
Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols.
380-403
Electronic Edition (link) BibTeX
- Juan A. Garay, Philip D. MacKenzie, Manoj Prabhakaran, Ke Yang:
Resource Fairness and Composability of Cryptographic Protocols.
404-428
Electronic Edition (link) BibTeX
One-Way Functions and Friends
Secret Sharing and Multi-party Computation (II)
Pseudo-Random Functions and Encryption
Copyright © Sat May 16 23:43:38 2009
by Michael Ley (ley@uni-trier.de)