Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II /
The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2016.
|
Σειρά: | Lecture Notes in Computer Science,
9986 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Delegation and IP
- Delegating RAM Computations with Adaptive Soundness and Privacy
- Interactive Oracle Proofs
- Adaptive Succinct Garbled RAM, or How To Delegate Your Database.-Delegating RAM Computations
- Public-Key Encryption
- Standard Security Does Not Imply Indistinguishability Under Selective Opening
- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
- Towards Non-Black-Box Separations of Public Key Encryption and One Way Function
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- Multi-Key FHE from LWE, Revisited
- Obfuscation and Multilinear Maps
- Secure Obfuscation in a Weak Multilinear Map Model
- Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents
- Attribute-Based Encryption
- Deniable Attribute Based Encryption for Branching Programs from LWE
- Targeted Homomorphic Attribute-Based Encryption
- Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
- Functional Encryption
- From Cryptomania to Obfustopia through Secret-Key Functional Encryption
- Single-Key to Multi-Key Functional Encryption with Polynomial Loss
- Compactness vs Collusion Resistance in Functional Encryption
- Secret Sharing
- Threshold Secret Sharing Requires a Linear Size Alphabet
- How to Share a Secret, Infinitely
- New Models
- Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
- Access Control Encryption: Enforcing Information Flow with Cryptography.