Theory of Cryptography

14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I

  • Martin Hirt
  • Adam Smith
Conference proceedings TCC 2016
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9985)

Table of contents

  1. Foundations of Multi-Party Protocols

    1. Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
      Pages 400-432
    2. Zahra Jafargholi, Daniel Wichs
      Pages 433-458
  2. Round Complexity and Efficiency of Multi-party Computation

    1. Front Matter
      Pages 459-459
    2. Carsten Baum, Emmanuela Orsini, Peter Scholl
      Pages 461-490
    3. Sanjam Garg, Divya Gupta, Peihan Miao, Omkant Pandey
      Pages 491-520
    4. Yehuda Lindell, Nigel P. Smart, Eduardo Soria-Vazquez
      Pages 554-581
    5. Jesper Buus Nielsen, Claudio Orlandi
      Pages 582-603
  3. Differential Privacy

    1. Front Matter
      Pages 605-605
    2. Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, Mark Zhandry
      Pages 659-689
  4. Back Matter
    Pages 691-692

Other volumes

  1. Theory of Cryptography
    14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I
  2. 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II

About these proceedings

Introduction

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016.

The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key encryption; obfuscation and multilinear maps; attribute-based encryption; functional encryption; secret sharing; new models.


Keywords

adaptive secure computation cloud computing cryptocurrency oblivious transfer verifiable delegation of computation algebraic manipulation detection bitcoin coin-tossing humancoin leakage-resilient cryptography lossy encryption minimal assumptions proof of human work public-key encryption quantum secure computation secure data outsourcing secure multiparty computation security definitions stream ciphers

Editors and affiliations

  • Martin Hirt
    • 1
  • Adam Smith
    • 2
  1. 1.Department of Computer ScienceETH ZurichZurichSwitzerland
  2. 2.Pennsylvania State UniversityUniversity ParkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-53641-4
  • Copyright Information International Association for Cryptologic Research 2016
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-53640-7
  • Online ISBN 978-3-662-53641-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349