Advertisement

Theory of Cryptography

13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II

  • Eyal Kushilevitz
  • Tal Malkin
Conference proceedings TCC 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9563)

Also part of the Security and Cryptology book sub series (LNSC, volume 9563)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Zero Knowledge and PCP

    1. Front Matter
      Pages 1-1
    2. Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Madars Virza
      Pages 33-64
    3. Michele Ciampi, Giuseppe Persiano, Luisa Siniscalchi, Ivan Visconti
      Pages 83-111
    4. Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
      Pages 112-141
  3. Oblivious RAM

    1. Front Matter
      Pages 143-143
    2. Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi, Daniel Wichs
      Pages 145-174
    3. Elette Boyle, Kai-Min Chung, Rafael Pass
      Pages 175-204
    4. Binyi Chen, Huijia Lin, Stefano Tessaro
      Pages 205-234
  4. ABE and IBE

    1. Front Matter
      Pages 235-235
    2. Hoeteck Wee
      Pages 237-258
    3. Shashank Agrawal, Melissa Chase
      Pages 259-288
  5. Codes and Interactive Proofs

    1. Front Matter
      Pages 289-289
    2. Stefan Dziembowski, Sebastian Faust, Maciej Skórski
      Pages 291-318
    3. Siyao Guo, Pavel Hubáček, Alon Rosen, Margarita Vald
      Pages 319-351
    4. Allison Bishop, Yevgeniy Dodis
      Pages 352-366
    5. Nishanth Chandran, Bhavana Kanukurthi, Srinivasan Raghuraman
      Pages 367-392
    6. Divesh Aggarwal, Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran
      Pages 393-417

Other volumes

  1. 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I
  2. Theory of Cryptography
    13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II
  3. 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I
  4. 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II

About these proceedings

Introduction

The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereed
proceedings of the 13th International Conference on Theory of
Cryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016.

The 45 revised full papers presented were carefully reviewed and
selected from 112 submissions. The papers are organized in topical
sections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also includes an invited talk on cryptographic assumptions. 

Keywords

Adaptive security Digital signatures Functional encryption Multiparty computation Public-key cryptography Approximation algorithms Authenticated encryption schemes Computational complexity Deterministic encryption Differential privacy Homomorphic encryption Learning theory Linear error correcting codes Multilinear maps Obfuscation One-way functions Pseudorandom generators Public-key encryption Tight security proofs Zero knowledge

Editors and affiliations

  • Eyal Kushilevitz
    • 1
  • Tal Malkin
    • 2
  1. 1.Department of Computer ScienceTechnion HaifaIsrael
  2. 2.Department of Computer ScienceColumbia University New YorkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-49099-0
  • Copyright Information International Association for Cryptologic Research 2016
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-49098-3
  • Online ISBN 978-3-662-49099-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site