Theory of Cryptography

14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II

  • Hirt Martin 
  • Smith Adam 
Conference proceedings TCC 2016

DOI: 10.1007/978-3-662-53644-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9986)

Table of contents (21 papers)

  1. Front Matter
    Pages I-XV
  2. Delegation and IP

    1. Front Matter
      Pages 1-1
    2. Delegating RAM Computations with Adaptive Soundness and Privacy
      Prabhanjan Ananth, Yu-Chi Chen, Kai-Min Chung, Huijia Lin, Wei-Kai Lin
      Pages 3-30
    3. Interactive Oracle Proofs
      Eli Ben-Sasson, Alessandro Chiesa, Nicholas Spooner
      Pages 31-60
    4. Adaptive Succinct Garbled RAM or: How to Delegate Your Database
      Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova
      Pages 61-90
    5. Delegating RAM Computations
      Yael Kalai, Omer Paneth
      Pages 91-118
  3. Public-Key Encryption

    1. Front Matter
      Pages 119-119
    2. Standard Security Does Not Imply Indistinguishability Under Selective Opening
      Dennis Hofheinz, Vanishree Rao, Daniel Wichs
      Pages 121-145
    3. Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
      Ehsan Ebrahimi Targhi, Dominique Unruh
      Pages 192-216
    4. Multi-key FHE from LWE, Revisited
      Chris Peikert, Sina Shiehian
      Pages 217-238
  4. Obfuscation and Multilinear Maps

    1. Front Matter
      Pages 239-239
    2. Secure Obfuscation in a Weak Multilinear Map Model
      Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry
      Pages 241-268
    3. Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents
      Shashank Agrawal, Manoj Prabhakaran, Ching-Hua Yu
      Pages 269-296
  5. Attribute-Based Encryption

    1. Front Matter
      Pages 297-297
    2. Deniable Attribute Based Encryption for Branching Programs from LWE
      Daniel Apon, Xiong Fan, Feng-Hao Liu
      Pages 299-329
    3. Targeted Homomorphic Attribute-Based Encryption
      Zvika Brakerski, David Cash, Rotem Tsabary, Hoeteck Wee
      Pages 330-360
    4. Semi-adaptive Security and Bundling Functionalities Made Generic and Easy
      Rishab Goyal, Venkata Koppula, Brent Waters
      Pages 361-388
  6. Functional Encryption

    1. Front Matter
      Pages 389-389

Other volumes

  1. Theory of Cryptography
    14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I
  2. Theory of Cryptography
    14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II

About these proceedings

Introduction

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016.

The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key encryption; obfuscation and multilinear maps; attribute-based encryption; functional encryption; secret sharing; new models.


Keywords

adaptive secure computation cloud computing cryptocurrency oblivious transfer verifiable delegation of computation algebraic manipulation detection bitcoin coin-tossing humancoin leakage-resilient cryptography lossy encryption minimal assumptions proof of human work public-key encryption quantum secure computation secure data outsourcing secure multiparty computation security definitions stream ciphers

Editors and affiliations

  • Hirt Martin 
    • 1
  • Smith Adam 
    • 2
  1. 1.Department of Computer ScienceETH ZurichZurichSwitzerland
  2. 2.Pennsylvania State University University ParkUSA

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2016
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-53643-8
  • Online ISBN 978-3-662-53644-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349