Book Volume 9986 2016

Theory of Cryptography

14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II

Editors:

ISBN: 978-3-662-53643-8 (Print) 978-3-662-53644-5 (Online)

Table of contents (21 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XV

  2. Delegation and IP

    1. Front Matter

      Pages 1-1

    2. No Access

      Chapter

      Pages 3-30

      Delegating RAM Computations with Adaptive Soundness and Privacy

    3. No Access

      Chapter

      Pages 31-60

      Interactive Oracle Proofs

    4. No Access

      Chapter

      Pages 61-90

      Adaptive Succinct Garbled RAM or: How to Delegate Your Database

    5. No Access

      Chapter

      Pages 91-118

      Delegating RAM Computations

  3. Public-Key Encryption

    1. Front Matter

      Pages 119-119

    2. No Access

      Chapter

      Pages 121-145

      Standard Security Does Not Imply Indistinguishability Under Selective Opening

    3. No Access

      Chapter

      Pages 146-168

      Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts

    4. No Access

      Chapter

      Pages 169-191

      Towards Non-Black-Box Separations of Public Key Encryption and One Way Function

    5. No Access

      Chapter

      Pages 192-216

      Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms

    6. No Access

      Chapter

      Pages 217-238

      Multi-key FHE from LWE, Revisited

  4. Obfuscation and Multilinear Maps

    1. Front Matter

      Pages 239-239

    2. No Access

      Chapter

      Pages 241-268

      Secure Obfuscation in a Weak Multilinear Map Model

    3. No Access

      Chapter

      Pages 269-296

      Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents

  5. Attribute-Based Encryption

    1. Front Matter

      Pages 297-297

    2. No Access

      Chapter

      Pages 299-329

      Deniable Attribute Based Encryption for Branching Programs from LWE

    3. No Access

      Chapter

      Pages 330-360

      Targeted Homomorphic Attribute-Based Encryption

    4. No Access

      Chapter

      Pages 361-388

      Semi-adaptive Security and Bundling Functionalities Made Generic and Easy

  6. Functional Encryption

    1. Front Matter

      Pages 389-389

    2. No Access

      Chapter

      Pages 391-418

      From Cryptomania to Obfustopia Through Secret-Key Functional Encryption

    3. No Access

      Chapter

      Pages 419-442

      Single-Key to Multi-Key Functional Encryption with Polynomial Loss

    4. No Access

      Chapter

      Pages 443-468

      Compactness vs Collusion Resistance in Functional Encryption

  7. Secret Sharing

    1. Front Matter

      Pages 469-469

    2. No Access

      Chapter

      Pages 471-484

      Threshold Secret Sharing Requires a Linear Size Alphabet

    3. No Access

      Chapter

      Pages 485-514

      How to Share a Secret, Infinitely

  8. New Models

    1. Front Matter

      Pages 515-515

    2. No Access

      Chapter

      Pages 517-546

      Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond

previous Page of 2