Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2

This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in Tokyo, Japan, in March 2013. The 36 revised full papers presented were carefully reviewed and selected from 98 submissions. The pape

  • PDF / 7,566,568 Bytes
  • 734 Pages / 439.363 x 666.131 pts Page_size
  • 74 Downloads / 197 Views

DOWNLOAD

REPORT


Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany

7785

Amit Sahai (Ed.)

Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013 Tokyo, Japan, March 3-6, 2013 Proceedings

13

Volume Editor Amit Sahai UCLA 3731E Boelter Hall Los Angeles, CA 90095, USA E-mail: [email protected]

ISSN 0302-9743 e-ISSN 1611-3349 ISBN 978-3-642-36593-5 e-ISBN 978-3-642-36594-2 DOI 10.1007/978-3-642-36594-2 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2013931230 CR Subject Classification (1998): E.3, D.4.6, K.6.5, F.1.1-2, C.2.0, F.2.1-2, G.2.2, I.1 LNCS Sublibrary: SL 4 – Security and Cryptology

© International Association for Cryptologic Research 2013 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in ist current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)

Preface

These are the proceedings of TCC 2013, the 10th Theory of Cryptography Conference, held at the University of Tokyo, Japan, during March 3–6, 2013. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chairs were Masayuki Abe and Tatsuaki Okamoto. The Program Committee accepted 36 papers out of 98 submissions. The program included papers on a wide variety of topics, from secure computation to zero-knowledge PCPs, by authors from many different backgrounds: one paper, “O