IACR, Theory of Cryptography Conference, 2009, Preface
TCC 2009, the Sixth Theory of Cryptography Conference, was held in San Francisco, CA, USA, from March 15 to 17, 2009. TCC 2009 was sponsored by the International Association for Cryptologic Research (IACR) and was organized in cooperation with the Applied Crypto Group at Stanford University. The General Chair of the conference was Dan Boneh.
The conference received 109 submissions, of which the Program Committee selected 33 for presentation at the conference. These proceedings consist of revised versions of those 33 papers. The revisions were not reviewed, and the authors bear full responsibility for the contents of their papers. The conference program also included two invited talks: "The Differential Privacy Frontier", given by Cynthia Dwork and "Some Recent Progress in Lattice-Based Cryptography", given by Chris Peikert.
I thank the Steering Committee of TCC for entrusting me with the responsibility for the TCC 2009 program. I thank the authors of submitted papers for their contributions. The general impression of the Program Committee is that the submissions were of very high quality, and there were many more papers we wanted to accept than we could. The review process was therefore very rewarding but the selection was very delicate and challenging. I am grateful for the dedication, thoroughness, and expertise of the Program Committee. Observing the way the members of the committee operated makes me as confident as possible of the outcome of our selection process. I also thank the many external reviewers who assisted the Program Committee in its work. I have benefited from the experience and advice of past TCC chairs, Ran Canetti, Moni Naor, and Salil Vadhan. I am indebted to Shai Halevi, who wrote a wonderful software package to facilitate all aspects of the PC work. Shai made his software available to us and provided rapid technical support. I am very grateful to TCC 2007 General Chair, Dan Boneh, who anticipated my requests before they were made. Thanks to our corporate Sponsors, Voltage Security, Google, Microsoft Research, the D. E. Shaw group, and IBM Research.
I appreciate the assistance provided by the Springer LNCS editorial staff, including Ursula Barth, Alfred Hofmann, Anna Kramer, and Nicole Sator, and the assistance provided by IACR Director, Christian Cachin.
December 2008 Omer ReingoldTCC 2009 Program Chair