default search action
14. TCC 2016: Beijing, China
- Martin Hirt, Adam D. Smith:
Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9986, 2016, ISBN 978-3-662-53643-8
Delegation and IP
- Prabhanjan Ananth, Yu-Chi Chen, Kai-Min Chung, Huijia Lin, Wei-Kai Lin:
Delegating RAM Computations with Adaptive Soundness and Privacy. 3-30 - Eli Ben-Sasson, Alessandro Chiesa, Nicholas Spooner:
Interactive Oracle Proofs. 31-60 - Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova:
Adaptive Succinct Garbled RAM or: How to Delegate Your Database. 61-90 - Yael Tauman Kalai, Omer Paneth:
Delegating RAM Computations. 91-118
Public-Key Encryption
- Dennis Hofheinz, Vanishree Rao, Daniel Wichs:
Standard Security Does Not Imply Indistinguishability Under Selective Opening. 121-145 - Dennis Hofheinz, Tibor Jager, Andy Rupp:
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. 146-168 - Dana Dachman-Soled:
Towards Non-Black-Box Separations of Public Key Encryption and One Way Function. 169-191 - Ehsan Ebrahimi Targhi, Dominique Unruh:
Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms. 192-216 - Chris Peikert, Sina Shiehian:
Multi-key FHE from LWE, Revisited. 217-238
Obfuscation and Multilinear Maps
- Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry:
Secure Obfuscation in a Weak Multilinear Map Model. 241-268 - Shashank Agrawal, Manoj Prabhakaran, Ching-Hua Yu:
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents. 269-296
Attribute-Based Encryption
- Daniel Apon, Xiong Fan, Feng-Hao Liu:
Deniable Attribute Based Encryption for Branching Programs from LWE. 299-329 - Zvika Brakerski, David Cash, Rotem Tsabary, Hoeteck Wee:
Targeted Homomorphic Attribute-Based Encryption. 330-360 - Rishab Goyal, Venkata Koppula, Brent Waters:
Semi-adaptive Security and Bundling Functionalities Made Generic and Easy. 361-388
Functional Encryption
- Nir Bitansky, Ryo Nishimaki, Alain Passelègue, Daniel Wichs:
From Cryptomania to Obfustopia Through Secret-Key Functional Encryption. 391-418 - Sanjam Garg, Akshayaram Srinivasan:
Single-Key to Multi-Key Functional Encryption with Polynomial Loss. 419-442 - Baiyu Li, Daniele Micciancio:
Compactness vs Collusion Resistance in Functional Encryption. 443-468
Secret Sharing
- Andrej Bogdanov, Siyao Guo, Ilan Komargodski:
Threshold Secret Sharing Requires a Linear Size Alphabet. 471-484 - Ilan Komargodski, Moni Naor, Eylon Yogev:
How to Share a Secret, Infinitely. 485-514
New Models
- Jeremiah Blocki, Hong-Sheng Zhou:
Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond. 517-546 - Ivan Damgård, Helene Haagh, Claudio Orlandi:
Access Control Encryption: Enforcing Information Flow with Cryptography. 547-576
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.