Skip to main content
  • Conference proceedings
  • © 2008

Theory of Cryptography

Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4948)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): TCC: Theory of Cryptography Conference

Conference proceedings info: TCC 2008.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (34 papers)

  1. Front Matter

  2. Technical Session 1

    1. On Seed-Incompressible Functions

      • Shai Halevi, Steven Myers, Charles Rackoff
      Pages 19-36
  3. Technical Session 2

    1. Asymptotically Efficient Lattice-Based Digital Signatures

      • Vadim Lyubashevsky, Daniele Micciancio
      Pages 37-54
    2. Basing Weak Public-Key Cryptography on Strong One-Way Functions

      • Eli Biham, Yaron J. Goren, Yuval Ishai
      Pages 55-72
  4. Technical Session 4

    1. Fast Private Norm Estimation and Heavy Hitters

      • Joe Kilian, André Madeira, Martin J. Strauss, Xuan Zheng
      Pages 176-193
  5. Technical Session 5

    1. Matroids Can Be Far from Ideal Secret Sharing

      • Amos Beimel, Noam Livne, Carles Padró
      Pages 194-212
    2. Perfectly-Secure MPC with Linear Communication Complexity

      • Zuzana Beerliová-Trubíniová, Martin Hirt
      Pages 213-230
    3. MPC vs. SFE: Perfect Security in a Unified Corruption Model

      • Zuzana Beerliová-Trubíniová, Matthias Fitzi, Martin Hirt, Ueli Maurer, Vassilis Zikas
      Pages 231-250
  6. Technical Session 6

    1. Verifiably Secure Devices

      • Sergei Izmalkov, Matt Lepinski, Silvio Micali
      Pages 273-301
    2. Lower Bounds on Implementing Robust and Resilient Mediators

      • Ittai Abraham, Danny Dolev, Joseph Y. Halpern
      Pages 302-319
  7. Technical Session 7

    1. Equivocal Blind Signatures and Adaptive UC-Security

      • Aggelos Kiayias, Hong-Sheng Zhou
      Pages 340-355

Other Volumes

  1. Theory of Cryptography

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access