Skip to main content
  • Conference proceedings
  • © 2013

Theory of Cryptography

10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings

Editors:

  • Up to date results
  • Fast track conference proceedings
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7785)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): TCC: Theory of Cryptography Conference

Conference proceedings info: TCC 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (41 papers)

  1. Secure Computation for Big Data

    • Tal Malkin
    Pages 355-355
  2. Communication Locality in Secure Multi-party Computation

    • Elette Boyle, Shafi Goldwasser, Stefano Tessaro
    Pages 356-376
  3. Distributed Oblivious RAM for Secure Two-Party Computation

    • Steve Lu, Rafail Ostrovsky
    Pages 377-396
  4. Testing the Lipschitz Property over Product Distributions with Applications to Data Privacy

    • Kashyap Dixit, Madhav Jha, Sofya Raskhodnikova, Abhradeep Thakurta
    Pages 418-436
  5. Limits on the Usefulness of Random Oracles

    • Iftach Haitner, Eran Omri, Hila Zarosim
    Pages 437-456
  6. Analyzing Graphs with Node Differential Privacy

    • Shiva Prasad Kasiviswanathan, Kobbi Nissim, Sofya Raskhodnikova, Adam Smith
    Pages 457-476
  7. Universally Composable Synchronous Computation

    • Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas
    Pages 477-498
  8. Multi-Client Non-interactive Verifiable Computation

    • Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid
    Pages 499-518
  9. On the Feasibility of Extending Oblivious Transfer

    • Yehuda Lindell, Hila Zarosim
    Pages 519-538
  10. Computational Soundness of Coinductive Symbolic Security under Active Attacks

    • Mohammad Hajiabadi, Bruce M. Kapron
    Pages 539-558
  11. Revisiting Lower and Upper Bounds for Selective Decommitments

    • Rafail Ostrovsky, Vanishree Rao, Alessandra Scafuro, Ivan Visconti
    Pages 559-578
  12. On the Circular Security of Bit-Encryption

    • Ron D. Rothblum
    Pages 579-598
  13. On the Power of Correlated Randomness in Secure Computation

    • Yuval Ishai, Eyal Kushilevitz, Sigurd Meldgaard, Claudio Orlandi, Anat Paskin-Cherniavsky
    Pages 600-620
  14. Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens

    • Nico Döttling, Thilo Mie, Jörn Müller-Quade, Tobias Nilges
    Pages 642-661
  15. A Cookbook for Black-Box Separations and a Recipe for UOWHFs

    • Kfir Barhum, Thomas Holenstein
    Pages 662-679
  16. Algebraic (Trapdoor) One-Way Functions and Their Applications

    • Dario Catalano, Dario Fiore, Rosario Gennaro, Konstantinos Vamvourellis
    Pages 680-699
  17. Randomness-Dependent Message Security

    • Eleanor Birrell, Kai-Min Chung, Rafael Pass, Sidharth Telang
    Pages 700-720

Other Volumes

  1. Theory of Cryptography

About this book

This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in Tokyo, Japan, in March 2013. The 36 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers cover topics such as study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones; formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography.

Editors and Affiliations

  • UCLA, Los Angeles, USA

    Amit Sahai

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access