Advertisement

© 2017

Theory of Cryptography

15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I

  • Yael Kalai
  • Leonid Reyzin
Conference proceedings TCC 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10677)

Also part of the Security and Cryptology book sub series (LNSC, volume 10677)

Table of contents

  1. Front Matter
    Pages I-XVII
  2. Impossibilities and Barriers

    1. Front Matter
      Pages 1-1
    2. Joshua Brody, Stefan Dziembowski, Sebastian Faust, Krzysztof Pietrzak
      Pages 56-81
    3. Sanjam Garg, Mohammad Mahmoody, Ameer Mohammed
      Pages 82-115
  3. Obfuscation

  4. Functional Encryption

    1. Front Matter
      Pages 171-171
    2. Shweta Agrawal, Alon Rosen
      Pages 173-205
  5. Constrained PRFs

    1. Front Matter
      Pages 235-235
    2. Dan Boneh, Sam Kim, David J. Wu
      Pages 237-263
    3. Zvika Brakerski, Rotem Tsabary, Vinod Vaikuntanathan, Hoeteck Wee
      Pages 264-302
  6. Encryption

    1. Front Matter
      Pages 303-303
    2. Shafi Goldwasser, Saleet Klein, Daniel Wichs
      Pages 305-340
    3. Dennis Hofheinz, Kathrin Hövelmanns, Eike Kiltz
      Pages 341-371
    4. Nico Döttling, Sanjam Garg
      Pages 372-408
    5. Tibor Jager, Martijn Stam, Ryan Stanley-Oakes, Bogdan Warinschi
      Pages 409-441

Other volumes

  1. Theory of Cryptography
    15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I
  2. 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II

About these proceedings

Introduction

The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017.

The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Keywords

adaptive secure computation cloud computing cryptocurrency oblivious transfer verifiable delegation of computation data security cryptography authentication encryption public key cryptography computer crime internet wireless telecommunication systems

Editors and affiliations

  • Yael Kalai
    • 1
  • Leonid Reyzin
    • 2
  1. 1.Microsoft Research New EnglandCambridgeUSA
  2. 2.Boston UniversityBostonUSA

Bibliographic information

Industry Sectors
Pharma
Automotive
Biotechnology
IT & Software
Telecommunications
Law
Aerospace
Engineering
Finance, Business & Banking
Electronics