Advertisement

Theory of Cryptography

15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I

  • Yael Kalai
  • Leonid Reyzin
Conference proceedings TCC 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10677)

Also part of the Security and Cryptology book sub series (LNSC, volume 10677)

Table of contents

  1. Front Matter
    Pages I-XVII
  2. Impossibilities and Barriers

    1. Front Matter
      Pages 1-1
    2. Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak
      Pages 56-81
    3. Sanjam Garg, Mohammad Mahmoody, Ameer Mohammed
      Pages 82-115
  3. Obfuscation

  4. Functional Encryption

    1. Front Matter
      Pages 171-171
    2. Shweta Agrawal, Alon Rosen
      Pages 173-205
  5. Constrained PRFs

    1. Front Matter
      Pages 235-235
    2. Dan Boneh, Sam Kim, David J. Wu
      Pages 237-263
    3. Zvika Brakerski, Rotem Tsabary, Vinod Vaikuntanathan, Hoeteck Wee
      Pages 264-302
  6. Encryption

    1. Front Matter
      Pages 303-303
    2. Shafi Goldwasser, Saleet Klein, Daniel Wichs
      Pages 305-340
    3. Dennis Hofheinz, Kathrin Hövelmanns, Eike Kiltz
      Pages 341-371
    4. Nico Döttling, Sanjam Garg
      Pages 372-408
    5. Tibor Jager, Martijn Stam, Ryan Stanley-Oakes, Bogdan Warinschi
      Pages 409-441
  7. Moderately Hard Functions

    1. Front Matter
      Pages 443-443
    2. Jeremiah Blocki, Samson Zhou
      Pages 445-465
    3. Ling Ren, Srinivas Devadas
      Pages 466-492
  8. Blockchains

    1. Front Matter
      Pages 527-527
  9. Multiparty Computation

    1. Front Matter
      Pages 563-563
    2. Prabhanjan Ananth, Abhishek Jain
      Pages 612-644
    3. Zvika Brakerski, Shai Halevi, Antigoni Polychroniadou
      Pages 645-677
    4. Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
      Pages 678-710
    5. Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti
      Pages 711-742
    6. Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Dakshita Khurana, Amit Sahai
      Pages 743-775
    7. Susumu Kiyoshima, Huijia Lin, Muthuramakrishnan Venkitasubramaniam
      Pages 776-809
  10. Back Matter
    Pages 811-812

Other volumes

  1. Theory of Cryptography
    15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I
  2. 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II

About these proceedings

Introduction

The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017.

The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Keywords

adaptive secure computation cloud computing cryptocurrency oblivious transfer verifiable delegation of computation data security cryptography authentication encryption public key cryptography computer crime internet wireless telecommunication systems

Editors and affiliations

  • Yael Kalai
    • 1
  • Leonid Reyzin
    • 2
  1. 1.Microsoft Research New EnglandCambridgeUSA
  2. 2.Boston UniversityBostonUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-70500-2
  • Copyright Information International Association for Cryptologic Research 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-70499-9
  • Online ISBN 978-3-319-70500-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace