skip to content
Theory of cryptography : Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006 : proceedings Preview this item
ClosePreview this item
Checking...

Theory of cryptography : Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006 : proceedings

Author: Shai Halevi; Tal Rabin
Publisher: Berlin ; New York : Springer, ©2006.
Series: Lecture notes in computer science, 3876.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Summary:

The papers are organized in topical sections on zero-knowledge, primitives, assumptions and models, the bounded-retrieval model, privacy, secret sharing and multi-party computation,  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference papers and proceedings
Congresses
Congrès
Additional Physical Format: Print version:
Theory of Cryptography Conference (3rd : 2006 : New York, N.Y.).
Theory of cryptography.
Berlin ; New York : Springer, ©2006
(DLC) 2006921180
(OCoLC)64572174
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Shai Halevi; Tal Rabin
ISBN: 9783540327325 3540327320 3540327312 9783540327318
OCLC Number: 262693005
Description: 1 online resource (xi, 616 pages) : illustrations
Contents: Zero-Knowledge --
Concurrent Zero Knowledge Without Complexity Assumptions --
Interactive Zero-Knowledge with Restricted Random Oracles --
Non-interactive Zero-Knowledge from Homomorphic Encryption --
Primitives --
Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles --
Efficient Blind and Partially Blind Signatures Without Random Oracles --
Key Exchange Using Passwords and Long Keys --
Mercurial Commitments: Minimal Assumptions and Efficient Constructions --
Assumptions and Models --
Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices --
On Error Correction in the Exponent --
On the Relation Between the Ideal Cipher and the Random Oracle Models --
The Bounded-Retrieval Model --
Intrusion-Resilience Via the Bounded-Storage Model --
Perfectly Secure Password Protocols in the Bounded Retrieval Model --
Privacy --
Polylogarithmic Private Approximations and Efficient Matching --
Calibrating Noise to Sensitivity in Private Data Analysis --
Secret Sharing and Multi-party Computation (I) --
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation --
Efficient Multi-party Computation with Dispute Control --
Round-Optimal and Efficient Verifiable Secret Sharing --
Universally-Composible Security --
Generalized Environmental Security from Number Theoretic Assumptions --
Games and the Impossibility of Realizable Ideal Functionality --
Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols --
Resource Fairness and Composability of Cryptographic Protocols --
One-Way Functions and Friends --
Finding Pessiland --
Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness --
On the Complexity of Parallel Hardness Amplification for One-Way Functions --
Secret Sharing and Multi-party Computation (II) --
On Matroids and Non-ideal Secret Sharing --
Secure Computation with Partial Message Loss --
Communication Efficient Secure Linear Algebra --
Threshold and Proactive Pseudo-Random Permutations --
Pseudo-Random Functions and Encryption --
PRF Domain Extension Using DAGs --
Chosen-Ciphertext Security from Tag-Based Encryption --
Separating Sources for Encryption and Secret Sharing.
Series Title: Lecture notes in computer science, 3876.
Other Titles: TCC 2006
Responsibility: Shai Halevi, Tal Rabin (eds.).

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/262693005> # Theory of cryptography : Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006 : proceedings
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "262693005" ;
    library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/49047793#Place/berlin> ; # Berlin
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/cryptography> ; # Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/samenleving> ; # samenleving
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/computeranalyse> ; # computeranalyse
    schema:about <http://id.worldcat.org/fast/884552> ; # Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/information_systems> ; # information systems
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/computer_sciences> ; # computer sciences
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/informatie_en_communicatietechnologie_algemeen> ; # Informatie- en communicatietechnologie (algemeen)
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/computer_analysis> ; # computer analysis
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/securite_informatique> ; # Sécurité informatique
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/mathematics> ; # mathematics
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/gegevensbeheer> ; # gegevensbeheer
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/wiskunde> ; # wiskunde
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/data_management> ; # data management
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/informatiesystemen> ; # informatiesystemen
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/algoritmen> ; # algoritmen
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/information_and_communication_technology_general> ; # Information and Communication Technology (General)
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/algorithms> ; # algorithms
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/society> ; # society
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/computers> ; # computers
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/operating_systems> ; # operating systems
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/computerwetenschappen> ; # computerwetenschappen
    schema:about <http://dewey.info/class/005.82/e22/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/informatique> ; # Informatique
    schema:about <http://experiment.worldcat.org/entity/work/data/49047793#Topic/cryptographie> ; # Cryptographie
    schema:alternateName "TCC 2006" ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/71351529> ; # Tal Rabin
    schema:contributor <http://viaf.org/viaf/25735830> ; # Shai Halevi
    schema:copyrightYear "2006" ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/49047793#Meeting/theory_of_cryptography_conference_3rd_2006_new_york_n_y> ; # Theory of Cryptography Conference (3rd : 2006 : New York, N.Y.)
    schema:datePublished "2006" ;
    schema:description "Zero-Knowledge -- Concurrent Zero Knowledge Without Complexity Assumptions -- Interactive Zero-Knowledge with Restricted Random Oracles -- Non-interactive Zero-Knowledge from Homomorphic Encryption -- Primitives -- Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles -- Efficient Blind and Partially Blind Signatures Without Random Oracles -- Key Exchange Using Passwords and Long Keys -- Mercurial Commitments: Minimal Assumptions and Efficient Constructions -- Assumptions and Models -- Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices -- On Error Correction in the Exponent -- On the Relation Between the Ideal Cipher and the Random Oracle Models -- The Bounded-Retrieval Model -- Intrusion-Resilience Via the Bounded-Storage Model -- Perfectly Secure Password Protocols in the Bounded Retrieval Model -- Privacy -- Polylogarithmic Private Approximations and Efficient Matching -- Calibrating Noise to Sensitivity in Private Data Analysis -- Secret Sharing and Multi-party Computation (I) -- Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation -- Efficient Multi-party Computation with Dispute Control -- Round-Optimal and Efficient Verifiable Secret Sharing -- Universally-Composible Security -- Generalized Environmental Security from Number Theoretic Assumptions -- Games and the Impossibility of Realizable Ideal Functionality -- Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols -- Resource Fairness and Composability of Cryptographic Protocols -- One-Way Functions and Friends -- Finding Pessiland -- Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness -- On the Complexity of Parallel Hardness Amplification for One-Way Functions -- Secret Sharing and Multi-party Computation (II) -- On Matroids and Non-ideal Secret Sharing -- Secure Computation with Partial Message Loss -- Communication Efficient Secure Linear Algebra -- Threshold and Proactive Pseudo-Random Permutations -- Pseudo-Random Functions and Encryption -- PRF Domain Extension Using DAGs -- Chosen-Ciphertext Security from Tag-Based Encryption -- Separating Sources for Encryption and Secret Sharing."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/49047793> ;
    schema:genre "Electronic books"@en ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Conference publication"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science,
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/49047793#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/64572174> ;
    schema:name "Theory of cryptography : Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006 : proceedings"@en ;
    schema:productID "262693005" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/262693005#PublicationEvent/berlin_new_york_springer_2006> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/49047793#Agent/springer> ; # Springer
    schema:url <http://www.myilibrary.com?id=140716> ;
    schema:url <http://rave.ohiolink.edu/ebooks/ebc/11681878> ;
    schema:url <https://link.springer.com/book/10.1007/11681878> ;
    schema:url <http://site.ebrary.com/id/10528743> ;
    schema:url <https://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=3067812> ;
    schema:url <https://link.springer.com/book/10.1007/978-3-540-32731-8> ;
    schema:url <http://VH7QX3XE2P.search.serialssolutions.com/?V=1.0&L=VH7QX3XE2P&S=JCs&C=TC0000320389&T=marc&tab=BOOKS> ;
    schema:url <https://doi.org/10.1007/11681878> ;
    schema:url <http://link.springer.com/10.1007/11681878> ;
    schema:url <https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=183544> ;
    schema:url <http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=3876> ;
    schema:workExample <http://dx.doi.org/10.1007/11681878> ;
    schema:workExample <http://worldcat.org/isbn/9783540327318> ;
    schema:workExample <http://worldcat.org/isbn/9783540327325> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA635070> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/262693005> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
    schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/49047793#Meeting/theory_of_cryptography_conference_3rd_2006_new_york_n_y> # Theory of Cryptography Conference (3rd : 2006 : New York, N.Y.)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/49047793#Place/new_york_n_y> ; # New York, N.Y.)
    schema:name "Theory of Cryptography Conference (3rd : 2006 : New York, N.Y.)" ;
    .

<http://experiment.worldcat.org/entity/work/data/49047793#Place/new_york_n_y> # New York, N.Y.)
    a schema:Place ;
    schema:name "New York, N.Y.)" ;
    .

<http://experiment.worldcat.org/entity/work/data/49047793#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/262693005> ; # Theory of cryptography : Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006 : proceedings
    schema:name "Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/49047793#Topic/computer_analysis> # computer analysis
    a schema:Intangible ;
    schema:name "computer analysis"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/49047793#Topic/computer_sciences> # computer sciences
    a schema:Intangible ;
    schema:name "computer sciences"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/49047793#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/49047793#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/49047793#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/49047793#Topic/computerwetenschappen> # computerwetenschappen
    a schema:Intangible ;
    schema:name "computerwetenschappen"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/49047793#Topic/cryptographie> # Cryptographie
    a schema:Intangible ;
    schema:name "Cryptographie"@en ;
    schema:name "Cryptographie"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/49047793#Topic/informatie_en_communicatietechnologie_algemeen> # Informatie- en communicatietechnologie (algemeen)
    a schema:Intangible ;
    schema:name "Informatie- en communicatietechnologie (algemeen)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/49047793#Topic/informatiesystemen> # informatiesystemen
    a schema:Intangible ;
    schema:name "informatiesystemen"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/49047793#Topic/information_and_communication_technology_general> # Information and Communication Technology (General)
    a schema:Intangible ;
    schema:name "Information and Communication Technology (General)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/49047793#Topic/information_systems> # information systems
    a schema:Intangible ;
    schema:name "information systems"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/49047793#Topic/operating_systems> # operating systems
    a schema:Intangible ;
    schema:name "operating systems"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/49047793#Topic/securite_informatique> # Sécurité informatique
    a schema:Intangible ;
    schema:name "Sécurité informatique"@en ;
    schema:name "Sécurité informatique"@fr ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/884552> # Cryptography
    a schema:Intangible ;
    schema:name "Cryptography"@en ;
    .

<http://viaf.org/viaf/25735830> # Shai Halevi
    a schema:Person ;
    schema:familyName "Halevi" ;
    schema:givenName "Shai" ;
    schema:name "Shai Halevi" ;
    .

<http://viaf.org/viaf/71351529> # Tal Rabin
    a schema:Person ;
    schema:familyName "Rabin" ;
    schema:givenName "Tal" ;
    schema:name "Tal Rabin" ;
    .

<http://worldcat.org/isbn/9783540327318>
    a schema:ProductModel ;
    schema:isbn "3540327312" ;
    schema:isbn "9783540327318" ;
    .

<http://worldcat.org/isbn/9783540327325>
    a schema:ProductModel ;
    schema:isbn "3540327320" ;
    schema:isbn "9783540327325" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science,
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/262693005> ; # Theory of cryptography : Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006 : proceedings
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/oclc/64572174>
    a schema:CreativeWork ;
    rdfs:label "Theory of cryptography." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/262693005> ; # Theory of cryptography : Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006 : proceedings
    .

<http://www.worldcat.org/title/-/oclc/262693005>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/262693005> ; # Theory of cryptography : Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006 : proceedings
    schema:dateModified "2019-11-09" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.