Theory of cryptography : 15th international conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings
Author(s)
Bibliographic Information
Theory of cryptography : 15th international conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings
(Lecture notes in computer science, 10677-10678 . LNCS sublibrary ; SL 4 . Security and cryptology)
Springer, c2017
- pt. 1
- pt. 2
Available at 1 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes bibliographical references and author index
"International Association for Cryptologic Research"--Cover
Description and Table of Contents
Description
The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017.
The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
Table of Contents
Impossibilities and Barriers.- Obfuscation.- Functional Encryption.- Constrained PRFs.- Encryption.- Moderately Hard Functions.- Blockchains.- Multiparty Computation.- Garbled Circuits and Oblivious RAM.- Zero-Knowledge and Non-Malleability.- Leakage and Tampering.- Delegation.- Non-Malleable Codes.- Secret Sharing.- OT Combiners.- Signatures.- Verifiable Random Functions.- Fully Homomorphic Encryption.- Database Privacy.- Assumptions.
by "Nielsen BookData"