Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II / edited by Martin Hirt, Adam Smith.

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Hirt, Martin (Editor), Smith, Adam (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2016.
Edition:1st ed. 2016.
Series:Security and Cryptology ; 9986
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Delegation and IP
  • Delegating RAM Computations with Adaptive Soundness and Privacy
  • Interactive Oracle Proofs
  • Adaptive Succinct Garbled RAM, or How To Delegate Your Database.-Delegating RAM Computations
  • Public-Key Encryption
  • Standard Security Does Not Imply Indistinguishability Under Selective Opening
  • Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
  • Towards Non-Black-Box Separations of Public Key Encryption and One Way Function
  • Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
  • Multi-Key FHE from LWE, Revisited
  • Obfuscation and Multilinear Maps
  • Secure Obfuscation in a Weak Multilinear Map Model
  • Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents
  • Attribute-Based Encryption
  • Deniable Attribute Based Encryption for Branching Programs from LWE
  • Targeted Homomorphic Attribute-Based Encryption
  • Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
  • Functional Encryption
  • From Cryptomania to Obfustopia through Secret-Key Functional Encryption
  • Single-Key to Multi-Key Functional Encryption with Polynomial Loss
  • Compactness vs Collusion Resistance in Functional Encryption
  • Secret Sharing
  • Threshold Secret Sharing Requires a Linear Size Alphabet
  • How to Share a Secret, Infinitely
  • New Models
  • Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
  • Access Control Encryption: Enforcing Information Flow with Cryptography.