Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9985)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: TCC 2016.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (25 papers)
-
TCC Test-of-Time Award
-
Foundations
-
Unconditional Security
-
Foundations of Multi-Party Protocols
Other volumes
-
Theory of Cryptography
-
Theory of Cryptography
-
Theory of Cryptography
-
Theory of Cryptography
Keywords
- adaptive secure computation
- cloud computing
- cryptocurrency
- oblivious transfer
- verifiable delegation of computation
- algebraic manipulation detection
- bitcoin
- coin-tossing
- humancoin
- leakage-resilient cryptography
- lossy encryption
- minimal assumptions
- proof of human work
- public-key encryption
- quantum
- secure computation
- secure data outsourcing
- secure multiparty computation
- security definitions
- stream ciphers
About this book
The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016.
The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key encryption; obfuscation and multilinear maps; attribute-based encryption; functional encryption; secret sharing; new models.
Editors and Affiliations
Bibliographic Information
Book Title: Theory of Cryptography
Book Subtitle: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I
Editors: Martin Hirt, Adam Smith
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-662-53641-4
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2016
Softcover ISBN: 978-3-662-53640-7Published: 23 October 2016
eBook ISBN: 978-3-662-53641-4Published: 21 October 2016
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVI, 692
Number of Illustrations: 85 b/w illustrations
Topics: Cryptology, Systems and Data Security, Algorithm Analysis and Problem Complexity, Discrete Mathematics in Computer Science, Management of Computing and Information Systems, Computer Communication Networks