Skip to main content
  • Conference proceedings
  • © 2015

Theory of Cryptography

12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9014)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): TCC: Theory of Cryptography Conference

Conference proceedings info: TCC 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

  2. Foundations

    1. On Basing Size-Verifiable One-Way Functions on NP-Hardness

      • Andrej Bogdanov, Christina Brzuska
      Pages 1-6
    2. The Power of Negations in Cryptography

      • Siyao Guo, Tal Malkin, Igor C. Oliveira, Alon Rosen
      Pages 36-65
    3. From Weak to Strong Zero-Knowledge and Applications

      • Kai-Min Chung, Edward Lui, Rafael Pass
      Pages 66-92
  3. Multiparty Computation

    1. A Little Honesty Goes a Long Way

      • Juan A. Garay, Ran Gelles, David S. Johnson, Aggelos Kiayias, Moti Yung
      Pages 134-158
    2. Topology-Hiding Computation

      • Tal Moran, Ilan Orlov, Silas Richelson
      Pages 159-181
    3. Secure Physical Computation Using Disposable Circuits

      • Ben A. Fisch, Daniel Freund, Moni Naor
      Pages 182-198
    4. Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions

      • Gilad Asharov, Amos Beimel, Nikolaos Makriyannis, Eran Omri
      Pages 199-228
    5. Richer Efficiency/Security Trade-offs in 2PC

      • Vladimir Kolesnikov, Payman Mohassel, Ben Riva, Mike Rosulek
      Pages 229-259
  4. Concurrent and Resettable Security

    1. Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma

      • Vipul Goyal, Huijia Lin, Omkant Pandey, Rafael Pass, Amit Sahai
      Pages 260-289
    2. General Statistically Secure Computation with Bounded-Resettable Hardware Tokens

      • Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges
      Pages 319-344
    3. Resettably Sound Zero-Knowledge Arguments from OWFs - The (Semi) Black-Box Way

      • Rafail Ostrovsky, Alessandra Scafuro, Muthuramakrishnan Venkitasubramanian
      Pages 345-374
  5. Non-malleable Codes and Tampering

    1. A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations

      • Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
      Pages 375-397
    2. Leakage-Resilient Non-malleable Codes

      • Divesh Aggarwal, Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
      Pages 398-426
    3. Locally Decodable and Updatable Non-malleable Codes and Their Applications

      • Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
      Pages 427-450
    4. Tamper Detection and Continuous Non-malleable Codes

      • Zahra Jafargholi, Daniel Wichs
      Pages 451-480

Other Volumes

  1. Theory of Cryptography

About this book

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015.
The 52 revised full papers presented were carefully reviewed and
selected from 137 submissions. The papers are organized in topical
sections on foundations, symmetric key, multiparty computation,
concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.

Editors and Affiliations

  • Department of Computer Science, New York University, New York, USA

    Yevgeniy Dodis

  • Department of Computer Science, Aarhus University, Aarhus N, Denmark

    Jesper Buus Nielsen

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access