Theory of Cryptography

14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II

  • Martin Hirt
  • Adam Smith
Conference proceedings TCC 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9986)

Also part of the Security and Cryptology book sub series (LNSC, volume 9986)

Table of contents

  1. Functional Encryption

    1. Nir Bitansky, Ryo Nishimaki, Alain Passelègue, Daniel Wichs
      Pages 391-418
    2. Sanjam Garg, Akshayaram Srinivasan
      Pages 419-442
    3. Baiyu Li, Daniele Micciancio
      Pages 443-468
  2. Secret Sharing

    1. Front Matter
      Pages 469-469
    2. Andrej Bogdanov, Siyao Guo, Ilan Komargodski
      Pages 471-484
    3. Ilan Komargodski, Moni Naor, Eylon Yogev
      Pages 485-514
  3. New Models

    1. Front Matter
      Pages 515-515
    2. Jeremiah Blocki, Hong-Sheng Zhou
      Pages 517-546
    3. Ivan Damgård, Helene Haagh, Claudio Orlandi
      Pages 547-576
  4. Back Matter
    Pages 577-578

Other volumes

  1. 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I
  2. Theory of Cryptography
    14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II

About these proceedings

Introduction

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016.

The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key encryption; obfuscation and multilinear maps; attribute-based encryption; functional encryption; secret sharing; new models.


Keywords

adaptive secure computation cloud computing cryptocurrency oblivious transfer verifiable delegation of computation algebraic manipulation detection bitcoin coin-tossing humancoin leakage-resilient cryptography lossy encryption minimal assumptions proof of human work public-key encryption quantum secure computation secure data outsourcing secure multiparty computation security definitions stream ciphers

Editors and affiliations

  • Martin Hirt
    • 1
  • Adam Smith
    • 2
  1. 1.Department of Computer ScienceETH ZurichZurichSwitzerland
  2. 2.Pennsylvania State University University ParkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-53644-5
  • Copyright Information International Association for Cryptologic Research 2016
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-53643-8
  • Online ISBN 978-3-662-53644-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book