IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of TCC 2006

Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings , Springer
Concurrent Zero Knowledge Without Complexity Assumptions., Daniele Micciancio, Shien Jin Ong, Amit Sahai, Salil P. Vadhan, pp. 1-20
 PDF  postscript BibTeX
Interactive Zero-Knowledge with Restricted Random Oracles., Moti Yung, Yunlei Zhao, pp. 21-40
 PDF  postscript BibTeX
Non-interactive Zero-Knowledge from Homomorphic Encryption., Ivan Damgård, Nelly Fazio, Antonio Nicolosi, pp. 41-59
 PDF  postscript BibTeX
Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles., Adam Bender, Jonathan Katz, Ruggero Morselli, pp. 60-79
 PDF  postscript BibTeX
Efficient Blind and Partially Blind Signatures Without Random Oracles., Tatsuaki Okamoto, pp. 80-99
 PDF  postscript BibTeX
Key Exchange Using Passwords and Long Keys., Vladimir Kolesnikov, Charles Rackoff, pp. 100-119
 PDF  postscript BibTeX
Mercurial Commitments: Minimal Assumptions and Efficient Constructions., Dario Catalano, Yevgeniy Dodis, Ivan Visconti, pp. 120-144
 PDF  postscript BibTeX
Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices., Chris Peikert, Alon Rosen, pp. 145-166
 PDF  postscript BibTeX
On Error Correction in the Exponent., Chris Peikert, pp. 167-183
 PDF  postscript BibTeX
On the Relation Between the Ideal Cipher and the Random Oracle Models., Yevgeniy Dodis, Prashant Puniya, pp. 184-206
 PDF  postscript BibTeX
Intrusion-Resilience Via the Bounded-Storage Model., Stefan Dziembowski, pp. 207-224
 PDF  postscript BibTeX
Perfectly Secure Password Protocols in the Bounded Retrieval Model., Giovanni Di Crescenzo, Richard J. Lipton, Shabsi Walfish, pp. 225-244
 PDF  postscript BibTeX
Polylogarithmic Private Approximations and Efficient Matching., Piotr Indyk, David P. Woodruff, pp. 245-264
 PDF  postscript BibTeX
Calibrating Noise to Sensitivity in Private Data Analysis., Cynthia Dwork, Frank McSherry, Kobbi Nissim, Adam Smith, pp. 265-284
 PDF  postscript BibTeX
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation., Ivan Damgård, Matthias Fitzi, Eike Kiltz, Jesper Buus Nielsen, Tomas Toft, pp. 285-304
 PDF  postscript BibTeX
Efficient Multi-party Computation with Dispute Control., Zuzana Beerliová-Trubíniová, Martin Hirt, pp. 305-328
 PDF  postscript BibTeX
Round-Optimal and Efficient Verifiable Secret Sharing., Matthias Fitzi, Juan A. Garay, Shyamnath Gollakota, C. Pandu Rangan, K. Srinathan, pp. 329-342
 PDF  postscript BibTeX
Generalized Environmental Security from Number Theoretic Assumptions., Tal Malkin, Ryan Moriarty, Nikolai Yakovenko, pp. 343-359
 PDF  postscript BibTeX
Games and the Impossibility of Realizable Ideal Functionality., Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov, pp. 360-379
 PDF  postscript BibTeX
Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols., Ran Canetti, Jonathan Herzog, pp. 380-403
 PDF  postscript BibTeX
Resource Fairness and Composability of Cryptographic Protocols., Juan A. Garay, Philip D. MacKenzie, Manoj Prabhakaran, Ke Yang, pp. 404-428
 PDF  postscript BibTeX
Finding Pessiland., Hoeteck Wee, pp. 429-442
 PDF  postscript BibTeX
Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness., Thomas Holenstein, pp. 443-461
 PDF  postscript BibTeX
On the Complexity of Parallel Hardness Amplification for One-Way Functions., Chi-Jen Lu, pp. 462-481
 PDF  postscript BibTeX
On Matroids and Non-ideal Secret Sharing., Amos Beimel, Noam Livne, pp. 482-501
 PDF  postscript BibTeX
Secure Computation with Partial Message Loss., Chiu-Yuen Koo, pp. 502-521
 PDF  postscript BibTeX
Communication Efficient Secure Linear Algebra., Kobbi Nissim, Enav Weinreb, pp. 522-541
 PDF  postscript BibTeX
Threshold and Proactive Pseudo-Random Permutations., Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung, pp. 542-560
 PDF  postscript BibTeX
PRF Domain Extension Using DAGs., Charanjit S. Jutla, pp. 561-580
 PDF  postscript BibTeX
Chosen-Ciphertext Security from Tag-Based Encryption., Eike Kiltz, pp. 581-600
 postscript BibTeX
Separating Sources for Encryption and Secret Sharing., Yevgeniy Dodis, Krzysztof Pietrzak, Bartosz Przydatek, pp. 601-616
 PDF  postscript BibTeX

[ IACR home page ] © IACR