Theory of cryptography = 14th Intern...
Theory of Cryptography Conference (2016 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Theory of cryptography = 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings.. Part II /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Theory of cryptography/ edited by Martin Hirt, Adam Smith.
    Reminder of title: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings.
    remainder title: TCC 2016-B
    other author: Hirt, Martin.
    corporate name: Theory of Cryptography Conference
    Published: Berlin, Heidelberg :Springer Berlin Heidelberg : : 2016.,
    Description: xv, 578 p. :ill., digital ;24 cm.
    [NT 15003449]: Delegation and IP -- Delegating RAM Computations with Adaptive Soundness and Privacy -- Interactive Oracle Proofs -- Adaptive Succinct Garbled RAM, or How To Delegate Your Database -- Delegating RAM Computations -- Public-Key Encryption -- Standard Security Does Not Imply Indistinguishability Under Selective Opening -- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts -- Towards Non-Black-Box Separations of Public Key Encryption and One Way Function -- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms -- Multi-Key FHE from LWE, Revisited -- Obfuscation and Multilinear Maps -- Secure Obfuscation in a Weak Multilinear Map Model -- Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents -- Attribute-Based Encryption -- Deniable Attribute Based Encryption for Branching Programs from LWE -- Targeted Homomorphic Attribute-Based Encryption -- Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy -- Functional Encryption -- From Cryptomania to Obfustopia through Secret-Key Functional Encryption -- Single-Key to Multi-Key Functional Encryption with Polynomial Loss -- Compactness vs Collusion Resistance in Functional Encryption -- Secret Sharing -- Threshold Secret Sharing Requires a Linear Size Alphabet -- How to Share a Secret, Infinitely -- New Models -- Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond -- Access Control Encryption: Enforcing Information Flow with Cryptography.
    Contained By: Springer eBooks
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: http://dx.doi.org/10.1007/978-3-662-53644-5
    ISBN: 9783662536445
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login