Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Vadhan, Salil P. (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Σειρά:Lecture Notes in Computer Science, 4392
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Encryption I
  • Does Privacy Require True Randomness?
  • Tackling Adaptive Corruptions in Multicast Encryption Protocols
  • Universally Composable Security
  • Long-Term Security and Universal Composability
  • Universally Composable Security with Global Setup
  • Arguments and Zero Knowledge
  • Parallel Repetition of Computationally Sound Protocols Revisited
  • Lower Bounds for Non-interactive Zero-Knowledge
  • Perfect NIZK with Adaptive Soundness
  • Notions of Security
  • Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
  • On the Necessity of Rewinding in Secure Multiparty Computation
  • On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits
  • Obfuscation
  • On Best-Possible Obfuscation
  • Obfuscation for Cryptographic Purposes
  • Securely Obfuscating Re-encryption
  • Secret Sharing and Multiparty Computation
  • Weakly-Private Secret Sharing Schemes
  • On Secret Sharing Schemes, Matroids and Polymatroids
  • Secure Linear Algebra Using Linearly Recurrent Sequences
  • Towards Optimal and Efficient Perfectly Secure Message Transmission
  • Signatures and Watermarking
  • Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions
  • Designated Confirmer Signatures Revisited
  • From Weak to Strong Watermarking
  • Private Approximation and Black-Box Reductions
  • Private Approximation of Clustering and Vertex Cover
  • Robuster Combiners for Oblivious Transfer
  • One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments
  • Towards a Separation of Semantic and CCA Security for Public Key Encryption
  • Key Establishment
  • Unifying Classical and Quantum Key Distillation
  • Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
  • (Password) Authenticated Key Establishment: From 2-Party to Group
  • Encryption II
  • Multi-authority Attribute Based Encryption
  • Conjunctive, Subset, and Range Queries on Encrypted Data
  • How to Shuffle in Public
  • Evaluating Branching Programs on Encrypted Data.