Advertisement

© 2018

Theory of Cryptography

16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II

  • Amos Beimel
  • Stefan Dziembowski
Conference proceedings TCC 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11240)

Also part of the Security and Cryptology book sub series (LNSC, volume 11240)

Table of contents

  1. Front Matter
    Pages I-XVII
  2. MPC Protocols

    1. Front Matter
      Pages 1-1
    2. Rio LaVigne, Chen-Da Liu-Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi
      Pages 3-35
    3. Alexander R. Block, Divya Gupta, Hemanta K. Maji, Hai H. Nguyen
      Pages 36-65
    4. Matteo Campanelli, Rosario Gennaro
      Pages 66-97
    5. Mike Rosulek, Morgan Shirley
      Pages 98-126
  3. Order-Revealing Encryption and Symmetric Encryption

  4. Information-Theoretic Cryptography II and Quantum Cryptography

    1. Front Matter
      Pages 223-223
    2. Ivan Damgård, Tomasz Kazana, Maciej Obremski, Varun Raj, Luisa Siniscalchi
      Pages 225-254
    3. Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
      Pages 255-281
    4. Frédéric Dupuis, Serge Fehr, Philippe Lamontagne, Louis Salvail
      Pages 282-314
  5. LWE-Based Cryptography

    1. Front Matter
      Pages 339-339
    2. Yilei Chen, Vinod Vaikuntanathan, Brent Waters, Hoeteck Wee, Daniel Wichs
      Pages 341-369
    3. Zvika Brakerski, Nico Döttling
      Pages 370-390
    4. Benoît Libert, Damien Stehlé, Radu Titiu
      Pages 391-421

Other volumes

  1. 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I
  2. Theory of Cryptography
    16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II

About these proceedings

Introduction

The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.

The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Keywords

authentication ciphertexts computer crime computer science cryptography data mining data privacy electronic document identification systems encryption hardware network security privacy privacy preserving probability project management public key cryptography secure multi-party computation semantics software engineering structural design

Editors and affiliations

  • Amos Beimel
    • 1
  • Stefan Dziembowski
    • 2
  1. 1.Ben Gurion UniversityBeer ShevaIsrael
  2. 2.University of WarsawWarsawPoland

Bibliographic information

Industry Sectors
Pharma
Automotive
Biotechnology
IT & Software
Telecommunications
Law
Aerospace
Engineering
Finance, Business & Banking
Electronics