Advertisement

Theory of Cryptography

13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I

  • Eyal Kushilevitz
  • Tal Malkin

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9562)

Also part of the Security and Cryptology book sub series (LNSC, volume 9562)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Obfuscation: Impossibility Results and Constructions

    1. Front Matter
      Pages 1-1
    2. Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji
      Pages 18-48
    3. Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, Abhi Shelat
      Pages 49-66
    4. Nir Bitansky, Vinod Vaikuntanathan
      Pages 67-95
    5. Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang
      Pages 96-124
    6. Prabhanjan Ananth, Amit Sahai
      Pages 125-153
  3. Differential Privacy

    1. Front Matter
      Pages 155-155
  4. LWR and LPN

    1. Front Matter
      Pages 207-207
    2. Andrej Bogdanov, Siyao Guo, Daniel Masny, Silas Richelson, Alon Rosen
      Pages 209-224
    3. David Cash, Eike Kiltz, Stefano Tessaro
      Pages 225-248
  5. Public Key Encryption, Signatures, and VRF

    1. Front Matter
      Pages 249-249
    2. Georg Fuchsbauer, Felix Heuer, Eike Kiltz, Krzysztof Pietrzak
      Pages 282-305
    3. Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi
      Pages 306-335
    4. Dennis Hofheinz, Tibor Jager
      Pages 336-362
  6. Complexity of Cryptographic Primitives

    1. Front Matter
      Pages 363-363
    2. Andrej Bogdanov, Chin Ho Lee
      Pages 365-371
    3. Tianren Liu, Vinod Vaikuntanathan
      Pages 372-386
  7. Obfuscation-Based Cryptographic Constructions

    1. Front Matter
      Pages 387-387
    2. Ran Canetti, Yilei Chen, Leonid Reyzin
      Pages 389-415
    3. Julia Hesse, Dennis Hofheinz, Andy Rupp
      Pages 416-445
    4. Martin R. Albrecht, Pooya Farshim, Dennis Hofheinz, Enrique Larraia, Kenneth G. Paterson
      Pages 446-473
    5. Nir Bitansky, Omer Paneth, Daniel Wichs
      Pages 474-502
  8. Cryptographic Assumptions (Invited Talk followed by Panel)

    1. Front Matter
      Pages 503-503
    2. Shafi Goldwasser, Yael Tauman Kalai
      Pages 505-522
  9. Multiparty Computation

    1. Front Matter
      Pages 523-523
    2. Brett Hemenway, Rafail Ostrovsky, Silas Richelson, Alon Rosen
      Pages 525-541
    3. Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti
      Pages 542-565
    4. Douglas Wikström
      Pages 566-595
    5. Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
      Pages 596-616
  10. Back Matter
    Pages 617-618

Other volumes

  1. Theory of Cryptography
    13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I
  2. 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II
  3. 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I
  4. 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II

About these proceedings

Introduction

The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereed
proceedings of the 13th International Conference on Theory of
Cryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016.

The 45 revised full papers presented were carefully reviewed and
selected from 112 submissions. The papers are organized in topical
sections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also includes an invited talk on cryptographic assumptions. 

Keywords

Adaptive security Digital signatures Functional encryption Multiparty computation Public-key cryptography Approximation algorithms Authenticated encryption schemes Computational complexity Deterministic encryption Differential privacy Homomorphic encryption Learning theory Linear error correcting codes Multilinear maps Obfuscation One-way functions Pseudorandom generators Public-key encryption Tight security proofs Zero knowledge

Editors and affiliations

  • Eyal Kushilevitz
    • 1
  • Tal Malkin
    • 2
  1. 1.Department of Computer ScienceTechnion HaifaIsrael
  2. 2.Department of Computer ScienceColumbia University New YorkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-49096-9
  • Copyright Information International Association for Cryptologic Research 2016
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-49095-2
  • Online ISBN 978-3-662-49096-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site