Login / Signup
TCC (B2)
2016
2016
2016
Keyphrases
Publications
2016
Ilan Komargodski
,
Moni Naor
,
Eylon Yogev
How to Share a Secret, Infinitely.
TCC (B2)
(2016)
Jeremiah Blocki
,
Hong-Sheng Zhou
Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond.
TCC (B2)
(2016)
Ehsan Ebrahimi Targhi
,
Dominique Unruh
Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms.
TCC (B2)
(2016)
Sanjam Garg
,
Akshayaram Srinivasan
Single-Key to Multi-Key Functional Encryption with Polynomial Loss.
TCC (B2)
(2016)
Yael Tauman Kalai
,
Omer Paneth
Delegating RAM Computations.
TCC (B2)
(2016)
Dennis Hofheinz
,
Vanishree Rao
,
Daniel Wichs
Standard Security Does Not Imply Indistinguishability Under Selective Opening.
TCC (B2)
(2016)
Eli Ben-Sasson
,
Alessandro Chiesa
,
Nicholas Spooner
Interactive Oracle Proofs.
TCC (B2)
(2016)
Ran Canetti
,
Yilei Chen
,
Justin Holmgren
,
Mariana Raykova
Adaptive Succinct Garbled RAM or: How to Delegate Your Database.
TCC (B2)
(2016)
Shashank Agrawal
,
Manoj Prabhakaran
,
Ching-Hua Yu
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents.
TCC (B2)
(2016)
Rishab Goyal
,
Venkata Koppula
,
Brent Waters
Semi-adaptive Security and Bundling Functionalities Made Generic and Easy.
TCC (B2)
(2016)
Dennis Hofheinz
,
Tibor Jager
,
Andy Rupp
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.
TCC (B2)
(2016)
Baiyu Li
,
Daniele Micciancio
Compactness vs Collusion Resistance in Functional Encryption.
TCC (B2)
(2016)
Ivan Damgård
,
Helene Haagh
,
Claudio Orlandi
Access Control Encryption: Enforcing Information Flow with Cryptography.
TCC (B2)
(2016)
Zvika Brakerski
,
David Cash
,
Rotem Tsabary
,
Hoeteck Wee
Targeted Homomorphic Attribute-Based Encryption.
TCC (B2)
(2016)
Daniel Apon
,
Xiong Fan
,
Feng-Hao Liu
Deniable Attribute Based Encryption for Branching Programs from LWE.
TCC (B2)
(2016)
Dana Dachman-Soled
Towards Non-Black-Box Separations of Public Key Encryption and One Way Function.
TCC (B2)
(2016)
Sanjam Garg
,
Eric Miles
,
Pratyay Mukherjee
,
Amit Sahai
,
Akshayaram Srinivasan
,
Mark Zhandry
Secure Obfuscation in a Weak Multilinear Map Model.
TCC (B2)
(2016)
Chris Peikert
,
Sina Shiehian
Multi-key FHE from LWE, Revisited.
TCC (B2)
(2016)
Prabhanjan Ananth
,
Yu-Chi Chen
,
Kai-Min Chung
,
Huijia Lin
,
Wei-Kai Lin
Delegating RAM Computations with Adaptive Soundness and Privacy.
TCC (B2)
(2016)
Andrej Bogdanov
,
Siyao Guo
,
Ilan Komargodski
Threshold Secret Sharing Requires a Linear Size Alphabet.
TCC (B2)
(2016)
Nir Bitansky
,
Ryo Nishimaki
,
Alain Passelègue
,
Daniel Wichs
From Cryptomania to Obfustopia Through Secret-Key Functional Encryption.
TCC (B2)
(2016)
volume 9986, 2016
Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II
TCC (B2)
9986 (2016)