Skip to main content
  • Conference proceedings
  • © 2009

Theory of Cryptography

Sixth Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5444)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): TCC: Theory of Cryptography Conference

Conference proceedings info: TCC 2009.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (36 papers)

  1. Front Matter

  2. An Optimally Fair Coin Toss

    • Tal Moran, Moni Naor, Gil Segev
    Pages 1-18
  3. Fairness with an Honest Minority and a Rational Majority

    • Shien Jin Ong, David C. Parkes, Alon Rosen, Salil Vadhan
    Pages 36-53
  4. Purely Rational Secret Sharing (Extended Abstract)

    • Silvio Micali, abhi shelat
    Pages 54-71
  5. Non-malleable Obfuscation

    • Ran Canetti, Mayank Varia
    Pages 73-90
  6. Simulation-Based Concurrent Non-malleable Commitments and Decommitments

    • Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti
    Pages 91-108
  7. Proofs of Retrievability via Hardness Amplification

    • Yevgeniy Dodis, Salil Vadhan, Daniel Wichs
    Pages 109-127
  8. Security Amplification for Interactive Cryptographic Primitives

    • Yevgeniy Dodis, Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets
    Pages 128-145
  9. Composability and On-Line Deniability of Authentication

    • Yevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi Walfish
    Pages 146-162
  10. Authenticated Adversarial Routing

    • Yair Amir, Paul Bunn, Rafail Ostrovsky
    Pages 163-182
  11. On the (Im)Possibility of Key Dependent Encryption

    • Iftach Haitner, Thomas Holenstein
    Pages 202-219
  12. On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols

    • Iftach Haitner, Alon Rosen, Ronen Shaltiel
    Pages 220-237
  13. Realistic Failures in Secure Multi-party Computation

    • Vassilis Zikas, Sarah Hauser, Ueli Maurer
    Pages 274-293
  14. Secure Arithmetic Computation with No Honest Majority

    • Yuval Ishai, Manoj Prabhakaran, Amit Sahai
    Pages 294-314
  15. Universally Composable Multiparty Computation with Partially Isolated Parties

    • Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs
    Pages 315-331

Other Volumes

  1. Theory of Cryptography

About this book

TCC 2009, the 6th Theory of Cryptography Conference, was held in San Fr- cisco, CA, USA, March 15–17, 2009. TCC 2009 was sponsored by the Inter- tional Association for Cryptologic Research (IACR) and was organized in - operation with the Applied Crypto Group at Stanford University. The General Chair of the conference was Dan Boneh. The conference received 109 submissions, of which the Program Comm- tee selected 33 for presentation at the conference. These proceedings consist of revised versions of those 33 papers. The revisions were not reviewed, and the authors bear full responsibility for the contents of their papers. The conference program also included two invited talks: “The Di?erential Privacy Frontier,” given by Cynthia Dwork and “Some Recent Progress in Lattice-Based Crypt- raphy,” given by Chris Peikert. I thank the Steering Committee of TCC for entrusting me with the resp- sibility for the TCC 2009 program. I thank the authors of submitted papers for their contributions. The general impression of the Program Committee is that the submissions were of very high quality, and there were many more papers we wanted to accept than we could. The review process was therefore very - warding but the selection was very delicate and challenging. I am grateful for the dedication, thoroughness,and expertise ofthe ProgramCommittee. Obse- ing the way the members of the committee operated makes me as con?dent as possible of the outcome of our selection process.

Editors and Affiliations

  • Faculty of Mathematics and Computer Science, The Weizmann Institute of Science, Rehovot, Israel

    Omer Reingold

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access