Cargando…

Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II /

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Hirt, Martin (Editor ), Smith, Adam (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2016.
Edición:1st ed. 2016.
Colección:Security and Cryptology ; 9986
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Delegation and IP
  • Delegating RAM Computations with Adaptive Soundness and Privacy
  • Interactive Oracle Proofs
  • Adaptive Succinct Garbled RAM, or How To Delegate Your Database.-Delegating RAM Computations
  • Public-Key Encryption
  • Standard Security Does Not Imply Indistinguishability Under Selective Opening
  • Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
  • Towards Non-Black-Box Separations of Public Key Encryption and One Way Function
  • Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
  • Multi-Key FHE from LWE, Revisited
  • Obfuscation and Multilinear Maps
  • Secure Obfuscation in a Weak Multilinear Map Model
  • Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents
  • Attribute-Based Encryption
  • Deniable Attribute Based Encryption for Branching Programs from LWE
  • Targeted Homomorphic Attribute-Based Encryption
  • Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
  • Functional Encryption
  • From Cryptomania to Obfustopia through Secret-Key Functional Encryption
  • Single-Key to Multi-Key Functional Encryption with Polynomial Loss
  • Compactness vs Collusion Resistance in Functional Encryption
  • Secret Sharing
  • Threshold Secret Sharing Requires a Linear Size Alphabet
  • How to Share a Secret, Infinitely
  • New Models
  • Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
  • Access Control Encryption: Enforcing Information Flow with Cryptography.