Theory of Cryptography
Springer Berlin (Verlag)
978-3-642-54241-1 (ISBN)
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding.- Obfuscation for Evasive Functions.- On Extractability Obfuscation.- Two-Round Secure MPC from Indistinguishability Obfuscation.- Chosen Ciphertext Security via Point Obfuscation.- Probabilistically Checkable Proofs of Proximity with Zero-Knowledge.- Achieving Constant Round Leakage-Resilient Zero-Knowledge.- Statistical Concurrent Non-malleable Zero Knowledge.- 4-Round Resettably-Sound Zero Knowledge.- Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?.- On the Power of Public-Key Encryption in Secure Computation.- On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations.- Towards Characterizing Complete Fairness in Secure Two-Party Computation.- On the Cryptographic Complexity of the Worst Functions.- Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol.- One-Sided Adaptively Secure Two-Party Computation.- Multi-linear Secret-Sharing.- Broadcast Amplification.- Non-malleable Coding against Bit-Wise and Split-State Tampering.- Continuous Non-malleable Codes.- Locally Updatable and Locally Decodable Codes.- Leakage Resilient Fully Homomorphic Encryption.- Securing Circuits and Protocols against 1/ poly(k) Tampering Rate.- How to Fake Auxiliary Input.- Standard versus Selective Opening Security: Separation and Equivalence Results.- Dual System Encryption via Predicate Encodings.- (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.- Lower Bounds in the Hardware Token Model.- Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures.- On the Impossibility of Structure-Preserving Deterministic Primitives.
Erscheint lt. Verlag | 29.1.2014 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XVI, 739 p. 59 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1123 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • coding theory • Malicious Adversaries • oblivious transfer • public-key encryption • verifiable random functions |
ISBN-10 | 3-642-54241-7 / 3642542417 |
ISBN-13 | 978-3-642-54241-1 / 9783642542411 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich