Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications by Conference
Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings
Preface and frontmatter
Page
Title
1-20
Does Privacy Require True Randomness?
21-40
Tackling Adaptive Corruptions in Multicast Encryption Protocols
41-60
Long-Term Security and Universal Composability
61-85
Universally Composable Security with Global Setup
86-102
Parallel Repetition of Computationally Sound Protocols Revisited
103-117
Lower Bounds for Non-interactive Zero-Knowledge
118-136
Perfect NIZK with Adaptive Soundness
137-156
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
157-173
On the Necessity of Rewinding in Secure Multiparty Computation
174-193
On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits
194-213
On Best-Possible Obfuscation
214-232
Obfuscation for Cryptographic Purposes
233-252
Securely Obfuscating Re-encryption
253-272
Weakly-Private Secret Sharing Schemes
273-290
On Secret Sharing Schemes, Matroids and Polymatroids
291-310
Secure Linear Algebra Using Linearly Recurrent Sequences
311-322
Towards Optimal and Efficient Perfectly Secure Message Transmission
323-341
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions
342-361
Designated Confirmer Signatures Revisited
362-382
From Weak to Strong Watermarking
383-403
Private Approximation of Clustering and Vertex Cover
404-418
Robuster Combiners for Oblivious Transfer
419-433
One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments
434-455
Towards a Separation of Semantic and CCA Security for Public Key Encryption
456-478
Unifying Classical and Quantum Key Distillation
479-498
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
499-514
(Password) Authenticated Key Establishment: From 2-Party to Group
515-534
Multi-authority Attribute Based Encryption
535-554
Conjunctive, Subset, and Range Queries on Encrypted Data
555-574
How to Shuffle in Public
575-594
Evaluating Branching Programs on Encrypted Data