6. TCC 2009:
San Francisco,
CA,
USA
Omer Reingold (Ed.):
Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings.
Lecture Notes in Computer Science 5444 Springer 2009, ISBN 978-3-642-00456-8 BibTeX
- Tal Moran, Moni Naor, Gil Segev:
An Optimally Fair Coin Toss.
1-18
Electronic Edition (link) BibTeX
- S. Dov Gordon, Jonathan Katz:
Complete Fairness in Multi-party Computation without an Honest Majority.
19-35
Electronic Edition (link) BibTeX
- Shien Jin Ong, David C. Parkes, Alon Rosen, Salil P. Vadhan:
Fairness with an Honest Minority and a Rational Majority.
36-53
Electronic Edition (link) BibTeX
- Silvio Micali, Abhi Shelat:
Purely Rational Secret Sharing (Extended Abstract).
54-71
Electronic Edition (link) BibTeX
- Chris Peikert:
Some Recent Progress in Lattice-Based Cryptography.
72
Electronic Edition (link) BibTeX
- Ran Canetti, Mayank Varia:
Non-malleable Obfuscation.
73-90
Electronic Edition (link) BibTeX
- Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti:
Simulation-Based Concurrent Non-malleable Commitments and Decommitments.
91-108
Electronic Edition (link) BibTeX
- Yevgeniy Dodis, Salil P. Vadhan, Daniel Wichs:
Proofs of Retrievability via Hardness Amplification.
109-127
Electronic Edition (link) BibTeX
- Yevgeniy Dodis, Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets:
Security Amplification for InteractiveCryptographic Primitives.
128-145
Electronic Edition (link) BibTeX
- Yevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi Walfish:
Composability and On-Line Deniability of Authentication.
146-162
Electronic Edition (link) BibTeX
- Yair Amir, Paul Bunn, Rafail Ostrovsky:
Authenticated Adversarial Routing.
163-182
Electronic Edition (link) BibTeX
- Yehuda Lindell, Hila Zarosim:
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer.
183-201
Electronic Edition (link) BibTeX
- Iftach Haitner, Thomas Holenstein:
On the (Im)Possibility of Key Dependent Encryption.
202-219
Electronic Edition (link) BibTeX
- Iftach Haitner, Alon Rosen, Ronen Shaltiel:
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols.
220-237
Electronic Edition (link) BibTeX
- Robin Künzler, Jörn Müller-Quade, Dominik Raub:
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security.
238-255
Electronic Edition (link) BibTeX
- Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek:
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation.
256-273
Electronic Edition (link) BibTeX
- Vassilis Zikas, Sarah Hauser, Ueli M. Maurer:
Realistic Failures in Secure Multi-party Computation.
274-293
Electronic Edition (link) BibTeX
- Yuval Ishai, Manoj Prabhakaran, Amit Sahai:
Secure Arithmetic Computation with No Honest Majority.
294-314
Electronic Edition (link) BibTeX
- Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs:
Universally Composable Multiparty Computation with Partially Isolated Parties.
315-331
Electronic Edition (link) BibTeX
- Jürg Wullschleger:
Oblivious Transfer from Weak Noisy Channels.
332-349
Electronic Edition (link) BibTeX
- Serge Fehr, Christian Schaffner:
Composing Quantum Protocols in a Classical Environment.
350-367
Electronic Edition (link) BibTeX
- Jesper Buus Nielsen, Claudio Orlandi:
LEGO for Two-Party Secure Computation.
368-386
Electronic Edition (link) BibTeX
- Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee:
Simple, Black-Box Constructions of Adaptively Secure Protocols.
387-402
Electronic Edition (link) BibTeX
- Rafael Pass, Hoeteck Wee:
Black-Box Constructions of Two-Party Protocols from One-Way Functions.
403-418
Electronic Edition (link) BibTeX
- Alon Rosen, Gil Segev:
Chosen-Ciphertext Security via Correlated Products.
419-436
Electronic Edition (link) BibTeX
- Craig Gentry, Shai Halevi:
Hierarchical Identity Based Encryption with Polynomially Many Levels.
437-456
Electronic Edition (link) BibTeX
- Emily Shen, Elaine Shi, Brent Waters:
Predicate Privacy in Encryption Systems.
457-473
Electronic Edition (link) BibTeX
- Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan:
Simultaneous Hardcore Bits and Cryptography against Memory Attacks.
474-495
Electronic Edition (link) BibTeX
- Cynthia Dwork:
The Differential Privacy Frontier (Extended Abstract).
496-502
Electronic Edition (link) BibTeX
- Cynthia Dwork, Moni Naor, Guy N. Rothblum, Vinod Vaikuntanathan:
How Efficient Can Memory Checking Be?.
503-520
Electronic Edition (link) BibTeX
- James Cook, Omid Etesami, Rachel Miller, Luca Trevisan:
Goldreich's One-Way Function Candidate and Myopic Backtracking Algorithms.
521-538
Electronic Edition (link) BibTeX
- Amos Beimel, Ilan Orlov:
Secret Sharing and Non-Shannon Information Inequalities.
539-557
Electronic Edition (link) BibTeX
- Zvika Brakerski, Shafi Goldwasser, Guy N. Rothblum, Vinod Vaikuntanathan:
Weak Verifiable Random Functions.
558-576
Electronic Edition (link) BibTeX
- Stanislaw Jarecki, Xiaomin Liu:
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection.
577-594
Electronic Edition (link) BibTeX
- Ran Canetti, Ronny Ramzi Dakdouk:
Towards a Theory of Extractable Functions.
595-613
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:43:39 2009
by Michael Ley (ley@uni-trier.de)