3. TCC 2006: New York, NY, USA

Zero-Knowledge

Primitives

Assumptions and Models

The Bounded-Retrieval Model

Privacy

Secret Sharing and Multi-party Computation (I)

Universally-Composible Security

One-Way Functions and Friends

Secret Sharing and Multi-party Computation (II)

Pseudo-Random Functions and Encryption