Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II

Author:   Martin Hirt ,  Adam Smith
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   1st ed. 2016
Volume:   9986
ISBN:  

9783662536438


Pages:   578
Publication Date:   25 October 2016
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II


Add your own review!

Overview

Full Product Details

Author:   Martin Hirt ,  Adam Smith
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   1st ed. 2016
Volume:   9986
Dimensions:   Width: 15.50cm , Height: 3.10cm , Length: 23.50cm
Weight:   8.891kg
ISBN:  

9783662536438


ISBN 10:   3662536439
Pages:   578
Publication Date:   25 October 2016
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Delegation and IP.- Delegating RAM Computations with Adaptive Soundness and Privacy.- Interactive Oracle Proofs.- Adaptive Succinct Garbled RAM, or How To Delegate Your Database.-Delegating RAM Computations.- Public-Key Encryption.- Standard Security Does Not Imply Indistinguishability Under Selective Opening.- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.- Towards Non-Black-Box Separations of Public Key Encryption and One Way Function.- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms.- Multi-Key FHE from LWE, Revisited.- Obfuscation and Multilinear Maps.- Secure Obfuscation in a Weak Multilinear Map Model.- Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents.- Attribute-Based Encryption.- Deniable Attribute Based Encryption for Branching Programs from LWE.- Targeted Homomorphic Attribute-Based Encryption.- Semi-Adaptive Security and Bundling Functionalities Made Generic andEasy.- Functional Encryption.- From Cryptomania to Obfustopia through Secret-Key Functional Encryption.- Single-Key to Multi-Key Functional Encryption with Polynomial Loss.- Compactness vs Collusion Resistance in Functional Encryption.- Secret Sharing.- Threshold Secret Sharing Requires a Linear Size Alphabet.- How to Share a Secret, Infinitely.- New Models.- Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond.- Access Control Encryption: Enforcing Information Flow with Cryptography.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List