Theory of Cryptography Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2006.
|
Edición: | 1st ed. 2006. |
Colección: | Security and Cryptology ;
3876 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Zero-Knowledge
- Concurrent Zero Knowledge Without Complexity Assumptions
- Interactive Zero-Knowledge with Restricted Random Oracles
- Non-interactive Zero-Knowledge from Homomorphic Encryption
- Primitives
- Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles
- Efficient Blind and Partially Blind Signatures Without Random Oracles
- Key Exchange Using Passwords and Long Keys
- Mercurial Commitments: Minimal Assumptions and Efficient Constructions
- Assumptions and Models
- Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices
- On Error Correction in the Exponent
- On the Relation Between the Ideal Cipher and the Random Oracle Models
- The Bounded-Retrieval Model
- Intrusion-Resilience Via the Bounded-Storage Model
- Perfectly Secure Password Protocols in the Bounded Retrieval Model
- Privacy
- Polylogarithmic Private Approximations and Efficient Matching
- Calibrating Noise to Sensitivity in Private Data Analysis
- Secret Sharing and Multi-party Computation (I)
- Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation
- Efficient Multi-party Computation with Dispute Control
- Round-Optimal and Efficient Verifiable Secret Sharing
- Universally-Composible Security
- Generalized Environmental Security from Number Theoretic Assumptions
- Games and the Impossibility of Realizable Ideal Functionality
- Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols
- Resource Fairness and Composability of Cryptographic Protocols
- One-Way Functions and Friends
- Finding Pessiland
- Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness
- On the Complexity of Parallel Hardness Amplification for One-Way Functions
- Secret Sharing and Multi-party Computation (II)
- On Matroids and Non-ideal Secret Sharing
- Secure Computation with Partial Message Loss
- Communication Efficient Secure Linear Algebra
- Threshold and Proactive Pseudo-Random Permutations
- Pseudo-Random Functions and Encryption
- PRF Domain Extension Using DAGs
- Chosen-Ciphertext Security from Tag-Based Encryption
- Separating Sources for Encryption and Secret Sharing.