


default search action
14. TCC 2016: Beijing, China
- Martin Hirt, Adam D. Smith:

Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9986, 2016, ISBN 978-3-662-53643-8
Delegation and IP
- Prabhanjan Ananth, Yu-Chi Chen

, Kai-Min Chung
, Huijia Lin, Wei-Kai Lin:
Delegating RAM Computations with Adaptive Soundness and Privacy. 3-30 - Eli Ben-Sasson, Alessandro Chiesa, Nicholas Spooner

:
Interactive Oracle Proofs. 31-60 - Ran Canetti, Yilei Chen, Justin Holmgren, Mariana Raykova:

Adaptive Succinct Garbled RAM or: How to Delegate Your Database. 61-90 - Yael Tauman Kalai, Omer Paneth:

Delegating RAM Computations. 91-118
Public-Key Encryption
- Dennis Hofheinz, Vanishree Rao, Daniel Wichs:

Standard Security Does Not Imply Indistinguishability Under Selective Opening. 121-145 - Dennis Hofheinz, Tibor Jager, Andy Rupp:

Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. 146-168 - Dana Dachman-Soled:

Towards Non-Black-Box Separations of Public Key Encryption and One Way Function. 169-191 - Ehsan Ebrahimi Targhi

, Dominique Unruh:
Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms. 192-216 - Chris Peikert, Sina Shiehian:

Multi-key FHE from LWE, Revisited. 217-238
Obfuscation and Multilinear Maps
- Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry

:
Secure Obfuscation in a Weak Multilinear Map Model. 241-268 - Shashank Agrawal, Manoj Prabhakaran, Ching-Hua Yu:

Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents. 269-296
Attribute-Based Encryption
- Daniel Apon, Xiong Fan, Feng-Hao Liu:

Deniable Attribute Based Encryption for Branching Programs from LWE. 299-329 - Zvika Brakerski, David Cash, Rotem Tsabary, Hoeteck Wee:

Targeted Homomorphic Attribute-Based Encryption. 330-360 - Rishab Goyal, Venkata Koppula, Brent Waters:

Semi-adaptive Security and Bundling Functionalities Made Generic and Easy. 361-388
Functional Encryption
- Nir Bitansky, Ryo Nishimaki, Alain Passelègue, Daniel Wichs:

From Cryptomania to Obfustopia Through Secret-Key Functional Encryption. 391-418 - Sanjam Garg, Akshayaram Srinivasan:

Single-Key to Multi-Key Functional Encryption with Polynomial Loss. 419-442 - Baiyu Li, Daniele Micciancio

:
Compactness vs Collusion Resistance in Functional Encryption. 443-468
Secret Sharing
- Andrej Bogdanov, Siyao Guo, Ilan Komargodski:

Threshold Secret Sharing Requires a Linear Size Alphabet. 471-484 - Ilan Komargodski, Moni Naor, Eylon Yogev:

How to Share a Secret, Infinitely. 485-514
New Models
- Jeremiah Blocki

, Hong-Sheng Zhou
:
Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond. 517-546 - Ivan Damgård, Helene Haagh, Claudio Orlandi

:
Access Control Encryption: Enforcing Information Flow with Cryptography. 547-576

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














