Theory of Cryptography [E-Book] : 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II / edited by Martin Hirt, Adam Smith.
The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected...
Saved in:
Full text |
|
Personal Name(s): | Hirt, Martin, editor |
Smith, Adam, editor | |
Imprint: |
Berlin, Heidelberg :
Springer,
2016
|
Physical Description: |
XV, 578 p. 32 illus. online resource. |
Note: |
englisch |
ISBN: |
9783662536445 |
DOI: |
10.1007/978-3-662-53644-5 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Lecture notes in computer science ;
9986 |
Subject (LOC): |
- Delegation and IP
- Delegating RAM Computations with Adaptive Soundness and Privacy
- Interactive Oracle Proofs
- Adaptive Succinct Garbled RAM, or How To Delegate Your Database.-Delegating RAM Computations
- Public-Key Encryption
- Standard Security Does Not Imply Indistinguishability Under Selective Opening
- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
- Towards Non-Black-Box Separations of Public Key Encryption and One Way Function
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- Multi-Key FHE from LWE, Revisited
- Obfuscation and Multilinear Maps
- Secure Obfuscation in a Weak Multilinear Map Model
- Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents
- Attribute-Based Encryption
- Deniable Attribute Based Encryption for Branching Programs from LWE
- Targeted Homomorphic Attribute-Based Encryption
- Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
- Functional Encryption
- From Cryptomania to Obfustopia through Secret-Key Functional Encryption
- Single-Key to Multi-Key Functional Encryption with Polynomial Loss
- Compactness vs Collusion Resistance in Functional Encryption
- Secret Sharing
- Threshold Secret Sharing Requires a Linear Size Alphabet
- How to Share a Secret, Infinitely
- New Models
- Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
- Access Control Encryption: Enforcing Information Flow with Cryptography.