TCC 2009:
Omer Reingold (Ed.):
Theory of Cryptography - TCC 2009,
6th Theory of Cryptography Conference,
TCC 2009, San Francisco, CA, USA,
March 15-17, 2009
Proceedings.
TCC 2009
TCC 2009, San Francisco, CA, USA,
March 15-17, 2009
Organizational Committee
Program Chairs : | Omer Reingold | |
General Chair : | Dan Boneh |
With Financial Support from
Voltage Security
Microsoft Research
D. E. Shaw group
IBM Research
Program Committee
Ivan Damgârd |
Stefan Dziembowski |
Marc Fischlin |
Matthew K. Franklin |
Jens Groth |
Thomas Holenstein |
Nicholas J. Hopper |
Yuval Ishai |
Charanjit S. Jutla |
Adam Kalai |
Daniele Micciancio |
Kobbi Nissim |
Adriana Palacio |
Rafael Pass |
Manoj Prabhakaran |
Brent Waters |
John Watrous |
External Referees
-
An Optimally Fair Coin Toss.
, 1-18,
Moni Naor
,
Tal Moran
,
Gil Segev
bib info -
Complete Fairness in Multi-party Computation without an Honest Majority.
, 19-35,
Jonathan Katz
,
S. Dov Gordon
bib info -
Fairness with an Honest Minority and a Rational Majority.
, 36-53,
Salil P. Vadhan
,
Shien Jin Ong
,
Alon Rosen
,
David C. Parkes
bib info -
Purely Rational Secret Sharing (Extended Abstract).
, 54-71,
Silvio Micali
,
Abhi Shelat
bib infoInvited Talk:
-
Some Recent Progress in Lattice-Based Cryptography.
, 72,
Chris Peikert
bib infoSession 2
-
Non-malleable Obfuscation.
, 73-90,
Ran Canetti
,
Mayank Varia
bib info -
Simulation-Based Concurrent Non-malleable Commitments and Decommitments.
, 91-108,
Giuseppe Persiano
,
Ivan Visconti
,
Rafail Ostrovsky
bib info -
Proofs of Retrievability via Hardness Amplification.
, 109-127,
Salil P. Vadhan
,
Yevgeniy Dodis
,
Daniel Wichs
bib infoSession 3
-
Security Amplification for InteractiveCryptographic Primitives.
, 128-145,
Russell Impagliazzo
,
Yevgeniy Dodis
,
Ragesh Jaiswal
,
Valentine Kabanets
bib info -
Composability and On-Line Deniability of Authentication.
, 146-162,
Jonathan Katz
,
Adam Smith
,
Yevgeniy Dodis
,
Shabsi Walfish
bib info -
Authenticated Adversarial Routing.
, 163-182,
Rafail Ostrovsky
,
Paul Bunn
,
Yair Amir
bib infoSession 4
-
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer.
, 183-201,
Yehuda Lindell
,
Hila Zarosim
bib info -
On the (Im)Possibility of Key Dependent Encryption.
, 202-219,
Thomas Holenstein
,
Iftach Haitner
bib info -
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols.
, 220-237,
Ronen Shaltiel
,
Alon Rosen
,
Iftach Haitner
bib infoSession 5
-
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security.
, 238-255,
Dominik Raub
,
Jörn Müller-Quade
,
Robin Künzler
bib info -
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation.
, 256-273,
Manoj Prabhakaran
,
Mike Rosulek
,
Hemanta K. Maji
bib info -
Realistic Failures in Secure Multi-party Computation.
, 274-293,
Ueli M. Maurer
,
Vassilis Zikas
,
Sarah Hauser
bib info -
Secure Arithmetic Computation with No Honest Majority.
, 294-314,
Amit Sahai
,
Yuval Ishai
,
Manoj Prabhakaran
bib infoSession 6
-
Universally Composable Multiparty Computation with Partially Isolated Parties.
, 315-331,
Ivan Damgård
,
Jesper Buus Nielsen
,
Daniel Wichs
bib info -
Oblivious Transfer from Weak Noisy Channels.
, 332-349,
Jürg Wullschleger
bib info -
Composing Quantum Protocols in a Classical Environment.
, 350-367,
Serge Fehr
,
Christian Schaffner
bib infoSession 7
-
LEGO for Two-Party Secure Computation.
, 368-386,
Jesper Buus Nielsen
,
Claudio Orlandi
bib info -
Simple, Black-Box Constructions of Adaptively Secure Protocols.
, 387-402,
Seung Geol Choi
,
Tal Malkin
,
Hoeteck Wee
,
Dana Dachman-Soled
bib info -
Black-Box Constructions of Two-Party Protocols from One-Way Functions.
, 403-418,
Rafael Pass
,
Hoeteck Wee
bib infoSession 8
-
Chosen-Ciphertext Security via Correlated Products.
, 419-436,
Alon Rosen
,
Gil Segev
bib info -
Hierarchical Identity Based Encryption with Polynomially Many Levels.
, 437-456,
Shai Halevi
,
Craig Gentry
bib info -
Predicate Privacy in Encryption Systems.
, 457-473,
Brent Waters
,
Emily Shen
,
Elaine Shi
bib info -
Simultaneous Hardcore Bits and Cryptography against Memory Attacks.
, 474-495,
Vinod Vaikuntanathan
,
Shafi Goldwasser
,
Adi Akavia
bib infoInvited Talk
-
The Differential Privacy Frontier (Extended Abstract).
, 496-502,
Cynthia Dwork
bib infoSession 9
-
How Efficient Can Memory Checking Be?.
, 503-520,
Moni Naor
,
Vinod Vaikuntanathan
,
Cynthia Dwork
,
Guy N. Rothblum
bib info -
Goldreich's One-Way Function Candidate and Myopic Backtracking Algorithms.
, 521-538,
Luca Trevisan
,
James Cook
,
Omid Etesami
,
Rachel Miller
bib info -
Secret Sharing and Non-Shannon Information Inequalities.
, 539-557,
Amos Beimel
,
Ilan Orlov
bib infoSession 10
-
Weak Verifiable Random Functions.
, 558-576,
Vinod Vaikuntanathan
,
Shafi Goldwasser
,
Guy N. Rothblum
,
Zvika Brakerski
bib info -
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection.
, 577-594,
Stanislaw Jarecki
,
Xiaomin Liu
bib info -
Towards a Theory of Extractable Functions.
, 595-613,
Ran Canetti
,
Ronny Ramzi Dakdouk
bib info
Session: Zero-Knowledge