Skip to main content
  • Conference proceedings
  • © 2015

Theory of Cryptography

12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9015)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): TCC: Theory of Cryptography Conference

Conference proceedings info: TCC 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

  2. Pseudorandom Functions and Applications

    1. Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions

      • Zvika Brakerski, Vinod Vaikuntanathan
      Pages 1-30
    2. Key-Homomorphic Constrained Pseudorandom Functions

      • Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens
      Pages 31-60
    3. Aggregate Pseudorandom Functions and Connections to Learning

      • Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan
      Pages 61-89
  3. Proofs and Verifiable Computation

    1. Multi-Client Verifiable Computation with Stronger Security Guarantees

      • S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou
      Pages 144-168
    2. Public Verification of Private Effort

      • Giulia Alberini, Tal Moran, Alon Rosen
      Pages 169-198
    3. Primary-Secondary-Resolver Membership Proof Systems

      • Moni Naor, Asaf Ziv
      Pages 199-228
  4. Differential Privacy

    1. Outlier Privacy

      • Edward Lui, Rafael Pass
      Pages 277-305
  5. Functional Encryption

    1. Functional Encryption for Randomized Functionalities

      • Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai
      Pages 325-351
  6. Obfuscation

    1. Separations in Circular Security for Arbitrary Length Key Cycles

      • Venkata Koppula, Kim Ramchen, Brent Waters
      Pages 378-400
    2. Random-Oracle Uninstantiability from Indistinguishability Obfuscation

      • Christina Brzuska, Pooya Farshim, Arno Mittelbach
      Pages 428-455
    3. On Obfuscation with Random Oracles

      • Ran Canetti, Yael Tauman Kalai, Omer Paneth
      Pages 456-467
    4. Obfuscation of Probabilistic Circuits and Applications

      • Ran Canetti, Huijia Lin, Stefano Tessaro, Vinod Vaikuntanathan
      Pages 468-497

Other Volumes

  1. Theory of Cryptography

About this book

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015.
The 52 revised full papers presented were carefully reviewed and
selected from 137 submissions. The papers are organized in topical
sections on foundations, symmetric key, multiparty computation,
concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.

Editors and Affiliations

  • Department of Computer Science, New York University, New York, USA

    Yevgeniy Dodis

  • Department of Computer Science, Aarhus University, Aarhus N, Denmark

    Jesper Buus Nielsen

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access