Search dblp for Publications

export results for "toc:db/conf/tcc/tcc2016b2.bht:"

 download as .bib file

@inproceedings{DBLP:conf/tcc/AgrawalPY16,
  author       = {Shashank Agrawal and
                  Manoj Prabhakaran and
                  Ching{-}Hua Yu},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Virtual Grey-Boxes Beyond Obfuscation: {A} Statistical Security Notion
                  for Cryptographic Agents},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {269--296},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_11},
  doi          = {10.1007/978-3-662-53644-5\_11},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AnanthCCLL16,
  author       = {Prabhanjan Ananth and
                  Yu{-}Chi Chen and
                  Kai{-}Min Chung and
                  Huijia Lin and
                  Wei{-}Kai Lin},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Delegating {RAM} Computations with Adaptive Soundness and Privacy},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {3--30},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_1},
  doi          = {10.1007/978-3-662-53644-5\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AnanthCCLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AponFL16,
  author       = {Daniel Apon and
                  Xiong Fan and
                  Feng{-}Hao Liu},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Deniable Attribute Based Encryption for Branching Programs from {LWE}},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {299--329},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_12},
  doi          = {10.1007/978-3-662-53644-5\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AponFL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Ben-SassonCS16,
  author       = {Eli Ben{-}Sasson and
                  Alessandro Chiesa and
                  Nicholas Spooner},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Interactive Oracle Proofs},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {31--60},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_2},
  doi          = {10.1007/978-3-662-53644-5\_2},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Ben-SassonCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BitanskyNPW16,
  author       = {Nir Bitansky and
                  Ryo Nishimaki and
                  Alain Passel{\`{e}}gue and
                  Daniel Wichs},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {From Cryptomania to Obfustopia Through Secret-Key Functional Encryption},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {391--418},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_15},
  doi          = {10.1007/978-3-662-53644-5\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BitanskyNPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BlockiZ16,
  author       = {Jeremiah Blocki and
                  Hong{-}Sheng Zhou},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {517--546},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_20},
  doi          = {10.1007/978-3-662-53644-5\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BlockiZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BogdanovGK16,
  author       = {Andrej Bogdanov and
                  Siyao Guo and
                  Ilan Komargodski},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Threshold Secret Sharing Requires a Linear Size Alphabet},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {471--484},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_18},
  doi          = {10.1007/978-3-662-53644-5\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BogdanovGK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrakerskiCTW16,
  author       = {Zvika Brakerski and
                  David Cash and
                  Rotem Tsabary and
                  Hoeteck Wee},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Targeted Homomorphic Attribute-Based Encryption},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {330--360},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_13},
  doi          = {10.1007/978-3-662-53644-5\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BrakerskiCTW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiCHR16,
  author       = {Ran Canetti and
                  Yilei Chen and
                  Justin Holmgren and
                  Mariana Raykova},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Adaptive Succinct Garbled {RAM} or: How to Delegate Your Database},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {61--90},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_3},
  doi          = {10.1007/978-3-662-53644-5\_3},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CanettiCHR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-Soled16,
  author       = {Dana Dachman{-}Soled},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Towards Non-Black-Box Separations of Public Key Encryption and One
                  Way Function},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {169--191},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_7},
  doi          = {10.1007/978-3-662-53644-5\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Dachman-Soled16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardHO16,
  author       = {Ivan Damg{\aa}rd and
                  Helene Haagh and
                  Claudio Orlandi},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Access Control Encryption: Enforcing Information Flow with Cryptography},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {547--576},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_21},
  doi          = {10.1007/978-3-662-53644-5\_21},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardHO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GargMMSSZ16,
  author       = {Sanjam Garg and
                  Eric Miles and
                  Pratyay Mukherjee and
                  Amit Sahai and
                  Akshayaram Srinivasan and
                  Mark Zhandry},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Secure Obfuscation in a Weak Multilinear Map Model},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {241--268},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_10},
  doi          = {10.1007/978-3-662-53644-5\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GargMMSSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GargS16,
  author       = {Sanjam Garg and
                  Akshayaram Srinivasan},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Single-Key to Multi-Key Functional Encryption with Polynomial Loss},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {419--442},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_16},
  doi          = {10.1007/978-3-662-53644-5\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GargS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoyalKW16,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Semi-adaptive Security and Bundling Functionalities Made Generic and
                  Easy},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {361--388},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_14},
  doi          = {10.1007/978-3-662-53644-5\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoyalKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HofheinzJR16,
  author       = {Dennis Hofheinz and
                  Tibor Jager and
                  Andy Rupp},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Public-Key Encryption with Simulation-Based Selective-Opening Security
                  and Compact Ciphertexts},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {146--168},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_6},
  doi          = {10.1007/978-3-662-53644-5\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HofheinzJR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HofheinzRW16,
  author       = {Dennis Hofheinz and
                  Vanishree Rao and
                  Daniel Wichs},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Standard Security Does Not Imply Indistinguishability Under Selective
                  Opening},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {121--145},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_5},
  doi          = {10.1007/978-3-662-53644-5\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HofheinzRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KalaiP16,
  author       = {Yael Tauman Kalai and
                  Omer Paneth},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Delegating {RAM} Computations},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {91--118},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_4},
  doi          = {10.1007/978-3-662-53644-5\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KalaiP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KomargodskiNY16,
  author       = {Ilan Komargodski and
                  Moni Naor and
                  Eylon Yogev},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {How to Share a Secret, Infinitely},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {485--514},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_19},
  doi          = {10.1007/978-3-662-53644-5\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KomargodskiNY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LiM16,
  author       = {Baiyu Li and
                  Daniele Micciancio},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Compactness vs Collusion Resistance in Functional Encryption},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {443--468},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_17},
  doi          = {10.1007/978-3-662-53644-5\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/LiM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PeikertS16,
  author       = {Chris Peikert and
                  Sina Shiehian},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Multi-key {FHE} from LWE, Revisited},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {217--238},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_9},
  doi          = {10.1007/978-3-662-53644-5\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/PeikertS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/TarghiU16,
  author       = {Ehsan Ebrahimi Targhi and
                  Dominique Unruh},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Post-Quantum Security of the Fujisaki-Okamoto and {OAEP} Transforms},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {192--216},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_8},
  doi          = {10.1007/978-3-662-53644-5\_8},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/TarghiU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016b2,
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5},
  doi          = {10.1007/978-3-662-53644-5},
  isbn         = {978-3-662-53643-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2016b2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics