Theory of cryptography = 14th Intern...
Theory of Cryptography Conference (2016 :)

FindBook      Google Book      Amazon      博客來     
  • Theory of cryptography = 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings.. Part II /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Theory of cryptography/ edited by Martin Hirt, Adam Smith.
    其他題名: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings.
    其他題名: TCC 2016-B
    其他作者: Hirt, Martin.
    團體作者: Theory of Cryptography Conference
    出版者: Berlin, Heidelberg :Springer Berlin Heidelberg : : 2016.,
    面頁冊數: xv, 578 p. :ill., digital ;24 cm.
    內容註: Delegation and IP -- Delegating RAM Computations with Adaptive Soundness and Privacy -- Interactive Oracle Proofs -- Adaptive Succinct Garbled RAM, or How To Delegate Your Database -- Delegating RAM Computations -- Public-Key Encryption -- Standard Security Does Not Imply Indistinguishability Under Selective Opening -- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts -- Towards Non-Black-Box Separations of Public Key Encryption and One Way Function -- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms -- Multi-Key FHE from LWE, Revisited -- Obfuscation and Multilinear Maps -- Secure Obfuscation in a Weak Multilinear Map Model -- Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents -- Attribute-Based Encryption -- Deniable Attribute Based Encryption for Branching Programs from LWE -- Targeted Homomorphic Attribute-Based Encryption -- Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy -- Functional Encryption -- From Cryptomania to Obfustopia through Secret-Key Functional Encryption -- Single-Key to Multi-Key Functional Encryption with Polynomial Loss -- Compactness vs Collusion Resistance in Functional Encryption -- Secret Sharing -- Threshold Secret Sharing Requires a Linear Size Alphabet -- How to Share a Secret, Infinitely -- New Models -- Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond -- Access Control Encryption: Enforcing Information Flow with Cryptography.
    Contained By: Springer eBooks
    標題: Data encryption (Computer science) - Congresses. -
    電子資源: http://dx.doi.org/10.1007/978-3-662-53644-5
    ISBN: 9783662536445
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入