LEADER 05432nam 22007815 450 001 996465626903316 005 20200630194305.0 010 $a3-662-53644-7 024 7 $a10.1007/978-3-662-53644-5 035 $a(CKB)3710000000926192 035 $a(DE-He213)978-3-662-53644-5 035 $a(MiAaPQ)EBC6301841 035 $a(MiAaPQ)EBC5590598 035 $a(Au-PeEL)EBL5590598 035 $a(OCoLC)962017973 035 $a(PPN)19632338X 035 $a(EXLCZ)993710000000926192 100 $a20161024d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTheory of Cryptography$b[electronic resource] $e14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II /$fedited by Martin Hirt, Adam Smith 205 $a1st ed. 2016. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2016. 215 $a1 online resource (XV, 578 p. 32 illus.) 225 1 $aSecurity and Cryptology ;$v9986 311 $a3-662-53643-9 327 $aDelegation and IP -- Delegating RAM Computations with Adaptive Soundness and Privacy -- Interactive Oracle Proofs -- Adaptive Succinct Garbled RAM, or How To Delegate Your Database.-Delegating RAM Computations -- Public-Key Encryption -- Standard Security Does Not Imply Indistinguishability Under Selective Opening -- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts -- Towards Non-Black-Box Separations of Public Key Encryption and One Way Function -- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms -- Multi-Key FHE from LWE, Revisited -- Obfuscation and Multilinear Maps -- Secure Obfuscation in a Weak Multilinear Map Model -- Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents -- Attribute-Based Encryption -- Deniable Attribute Based Encryption for Branching Programs from LWE -- Targeted Homomorphic Attribute-Based Encryption -- Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy -- Functional Encryption -- From Cryptomania to Obfustopia through Secret-Key Functional Encryption -- Single-Key to Multi-Key Functional Encryption with Polynomial Loss -- Compactness vs Collusion Resistance in Functional Encryption -- Secret Sharing -- Threshold Secret Sharing Requires a Linear Size Alphabet -- How to Share a Secret, Infinitely -- New Models -- Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond -- Access Control Encryption: Enforcing Information Flow with Cryptography. 330 $aThe two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key encryption; obfuscation and multilinear maps; attribute-based encryption; functional encryption; secret sharing; new models. 410 0$aSecurity and Cryptology ;$v9986 606 $aData encryption (Computer science) 606 $aComputer security 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aManagement information systems 606 $aComputer science 606 $aComputer communication systems 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer communication systems. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 676 $a004 702 $aHirt$b Martin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSmith$b Adam$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465626903316 996 $aTheory of Cryptography$9772206 997 $aUNISA