Theory of Cryptography

14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II

  • Martin Hirt
  • Adam Smith
Conference proceedings TCC 2016

DOI: 10.1007/978-3-662-53644-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9986)

Table of contents (21 papers)

  1. Front Matter
    Pages I-XV
  2. Delegation and IP

    1. Front Matter
      Pages 1-1
    2. Prabhanjan Ananth, Yu-Chi Chen, Kai-Min Chung, Huijia Lin, Wei-Kai Lin
      Pages 3-30
    3. Eli Ben-Sasson, Alessandro Chiesa, Nicholas Spooner
      Pages 31-60
    4. Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova
      Pages 61-90
    5. Yael Kalai, Omer Paneth
      Pages 91-118
  3. Public-Key Encryption

    1. Front Matter
      Pages 119-119
    2. Dennis Hofheinz, Vanishree Rao, Daniel Wichs
      Pages 121-145
    3. Ehsan Ebrahimi Targhi, Dominique Unruh
      Pages 192-216
    4. Chris Peikert, Sina Shiehian
      Pages 217-238
  4. Obfuscation and Multilinear Maps

    1. Front Matter
      Pages 239-239
    2. Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry
      Pages 241-268
    3. Shashank Agrawal, Manoj Prabhakaran, Ching-Hua Yu
      Pages 269-296
  5. Attribute-Based Encryption

    1. Front Matter
      Pages 297-297
    2. Daniel Apon, Xiong Fan, Feng-Hao Liu
      Pages 299-329
    3. Zvika Brakerski, David Cash, Rotem Tsabary, Hoeteck Wee
      Pages 330-360
    4. Rishab Goyal, Venkata Koppula, Brent Waters
      Pages 361-388
  6. Functional Encryption

    1. Front Matter
      Pages 389-389

Other volumes

  1. 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I
  2. Theory of Cryptography
    14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II

About these proceedings

Introduction

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016.

The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key encryption; obfuscation and multilinear maps; attribute-based encryption; functional encryption; secret sharing; new models.


Keywords

adaptive secure computation cloud computing cryptocurrency oblivious transfer verifiable delegation of computation algebraic manipulation detection bitcoin coin-tossing humancoin leakage-resilient cryptography lossy encryption minimal assumptions proof of human work public-key encryption quantum secure computation secure data outsourcing secure multiparty computation security definitions stream ciphers

Editors and affiliations

  • Martin Hirt
    • 1
  • Adam Smith
    • 2
  1. 1.Department of Computer ScienceETH ZurichZurichSwitzerland
  2. 2.Pennsylvania State University University ParkUSA

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2016
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-53643-8
  • Online ISBN 978-3-662-53644-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349