Skip to main content
  • Conference proceedings
  • © 2010

Theory of Cryptography

7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010, Proceedings

  • Fast track conference proceeding
  • Unique visibility
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5978)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): TCC: Theory of Cryptography Conference

Conference proceedings info: TCC 2010.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (36 papers)

  1. Front Matter

  2. Parallel Repetition

    1. An Efficient Parallel Repetition Theorem

      • Johan HÃ¥stad, Rafael Pass, Douglas Wikström, Krzysztof Pietrzak
      Pages 1-18
    2. Parallel Repetition Theorems for Interactive Arguments

      • Kai-Min Chung, Feng-Hao Liu
      Pages 19-36
  3. Obfuscation

    1. On Symmetric Encryption and Point Obfuscation

      • Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs
      Pages 52-71
    2. Obfuscation of Hyperplane Membership

      • Ran Canetti, Guy N. Rothblum, Mayank Varia
      Pages 72-89
  4. Invited Talk

  5. Multiparty Computation

    1. On Complete Primitives for Fairness

      • Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostrovsky, Amit Sahai
      Pages 91-108
    2. On the Necessary and Sufficient Assumptions for UC Computation

      • Ivan DamgÃ¥rd, Jesper Buus Nielsen, Claudio Orlandi
      Pages 109-127
    3. From Passive to Covert Security at Low Cost

      • Ivan DamgÃ¥rd, Martin Geisler, Jesper Buus Nielsen
      Pages 128-145
  6. Threshold Cryptography and Secret Sharing

    1. Efficient, Robust and Constant-Round Distributed RSA Key Generation

      • Ivan DamgÃ¥rd, Gert Læssøe Mikkelsen
      Pages 183-200
    2. Ideal Hierarchical Secret Sharing Schemes

      • Oriol Farràs, Carles Padró
      Pages 219-236
  7. Symmetric Cryptography

    1. On Related-Secret Pseudorandomness

      • David Goldenberg, Moses Liskov
      Pages 255-272
    2. A Domain Extender for the Ideal Cipher

      • Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin
      Pages 273-289
    3. Delayed-Key Message Authentication for Streams

      • Marc Fischlin, Anja Lehmann
      Pages 290-307
  8. Key-Leakage and Tamper-Resistance

    1. Founding Cryptography on Tamper-Proof Hardware Tokens

      • Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia
      Pages 308-326

Other Volumes

  1. Theory of Cryptography

About this book

This book constitutes the refereed proceedings of the Seventh Theory of Cryptography Conference, TCC 2010, held in Zurich, Switzerland, February 9-11, 2010. The 33 revised full papers presented together with two invited talks were carefully reviewed and selected from 100 submissions.The papers are organized in topical sections on parallel repetition, obfuscation, multiparty computation, CCA security, threshold cryptography and secret sharing, symmetric cryptography, key-leakage and tamper-resistance, rationality and privacy, public-key encryption, and zero-knowledge.

Editors and Affiliations

  • Computer Science & Engineering Department, University of California,, San Diego, USA

    Daniele Micciancio

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access