Search dblp for Publications

export results for "toc:db/conf/tcc/tcc2017-1.bht:"

 download as .bib file

@inproceedings{DBLP:conf/tcc/0001D17,
  author       = {Ling Ren and
                  Srinivas Devadas},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Bandwidth Hard Functions for {ASIC} Resistance},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {466--492},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_16},
  doi          = {10.1007/978-3-319-70500-2\_16},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/0001D17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/0009Z17,
  author       = {Bo Tang and
                  Jiapeng Zhang},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Barriers to Black-Box Constructions of Traitor Tracing Systems},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {3--30},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_1},
  doi          = {10.1007/978-3-319-70500-2\_1},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/0009Z17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgrawalR17,
  author       = {Shweta Agrawal and
                  Alon Rosen},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Functional Encryption for Bounded Collusions, Revisited},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {173--205},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_7},
  doi          = {10.1007/978-3-319-70500-2\_7},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AlwenT17,
  author       = {Jo{\"{e}}l Alwen and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Moderately Hard Functions: Definition, Instantiations, and Applications},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {493--526},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_17},
  doi          = {10.1007/978-3-319-70500-2\_17},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AlwenT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Ananth017,
  author       = {Prabhanjan Ananth and
                  Abhishek Jain},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {On Secure Two-Party Computation in Three Rounds},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {612--644},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_21},
  doi          = {10.1007/978-3-319-70500-2\_21},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Ananth017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BadrinarayananG17,
  author       = {Saikrishna Badrinarayanan and
                  Vipul Goyal and
                  Abhishek Jain and
                  Dakshita Khurana and
                  Amit Sahai},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Round Optimal Concurrent {MPC} via Strong Simulation},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {743--775},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_25},
  doi          = {10.1007/978-3-319-70500-2\_25},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BadrinarayananG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BlockiZ17,
  author       = {Jeremiah Blocki and
                  Samson Zhou},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {445--465},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_15},
  doi          = {10.1007/978-3-319-70500-2\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BlockiZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BonehKW17,
  author       = {Dan Boneh and
                  Sam Kim and
                  David J. Wu},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Constrained Keys for Invertible Pseudorandom Functions},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {237--263},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_9},
  doi          = {10.1007/978-3-319-70500-2\_9},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BonehKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrakerskiHP17,
  author       = {Zvika Brakerski and
                  Shai Halevi and
                  Antigoni Polychroniadou},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Four Round Secure Computation Without Setup},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {645--677},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_22},
  doi          = {10.1007/978-3-319-70500-2\_22},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BrakerskiHP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrakerskiTVW17,
  author       = {Zvika Brakerski and
                  Rotem Tsabary and
                  Vinod Vaikuntanathan and
                  Hoeteck Wee},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Private Constrained PRFs (and More) from {LWE}},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {264--302},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_10},
  doi          = {10.1007/978-3-319-70500-2\_10},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BrakerskiTVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrodyDFP17,
  author       = {Joshua Brody and
                  Stefan Dziembowski and
                  Sebastian Faust and
                  Krzysztof Pietrzak},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Position-Based Cryptography and Multiparty Communication Complexity},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {56--81},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_3},
  doi          = {10.1007/978-3-319-70500-2\_3},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BrodyDFP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CiampiOSV17,
  author       = {Michele Ciampi and
                  Rafail Ostrovsky and
                  Luisa Siniscalchi and
                  Ivan Visconti},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Round-Optimal Secure Two-Party Computation from Trapdoor Permutations},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {678--710},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_23},
  doi          = {10.1007/978-3-319-70500-2\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CiampiOSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CiampiOSV17a,
  author       = {Michele Ciampi and
                  Rafail Ostrovsky and
                  Luisa Siniscalchi and
                  Ivan Visconti},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing
                  in Four Rounds},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {711--742},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_24},
  doi          = {10.1007/978-3-319-70500-2\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CiampiOSV17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DazaM17,
  author       = {Vanesa Daza and
                  Nikolaos Makriyannis},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Designing Fully Secure Protocols for Secure Two-Party Computation
                  of Constant-Domain Functions},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {581--611},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_20},
  doi          = {10.1007/978-3-319-70500-2\_20},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DazaM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DottlingG17,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {From Selective {IBE} to Full {IBE} and Selective {HIBE}},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {372--408},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_13},
  doi          = {10.1007/978-3-319-70500-2\_13},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/DottlingG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GargMM17,
  author       = {Sanjam Garg and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {When Does Functional Encryption Imply Obfuscation?},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {82--115},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_4},
  doi          = {10.1007/978-3-319-70500-2\_4},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GargMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoldwasserKW17,
  author       = {Shafi Goldwasser and
                  Saleet Klein and
                  Daniel Wichs},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {The Edited Truth},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {305--340},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_11},
  doi          = {10.1007/978-3-319-70500-2\_11},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GoldwasserKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoyalG17,
  author       = {Rishab Goyal and
                  Vipul Goyal},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Overcoming Cryptographic Impossibility Results Using Blockchains},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {529--561},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_18},
  doi          = {10.1007/978-3-319-70500-2\_18},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GoyalG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HofheinzHK17,
  author       = {Dennis Hofheinz and
                  Kathrin H{\"{o}}velmanns and
                  Eike Kiltz},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {A Modular Analysis of the Fujisaki-Okamoto Transformation},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {341--371},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_12},
  doi          = {10.1007/978-3-319-70500-2\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HofheinzHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JagerSSW17,
  author       = {Tibor Jager and
                  Martijn Stam and
                  Ryan Stanley{-}Oakes and
                  Bogdan Warinschi},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Multi-key Authenticated Encryption with Corruptions: Reductions Are
                  Lossy},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {409--441},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_14},
  doi          = {10.1007/978-3-319-70500-2\_14},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/JagerSSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KiyoshimaLV17,
  author       = {Susumu Kiyoshima and
                  Huijia Lin and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {A Unified Approach to Constructing Black-Box {UC} Protocols in Trusted
                  Setup Models},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {776--809},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_26},
  doi          = {10.1007/978-3-319-70500-2\_26},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/KiyoshimaLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LindellR17,
  author       = {Yehuda Lindell and
                  Tal Rabin},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Secure Two-Party Computation with Fairness - {A} Necessary Design
                  Principle},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {565--580},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_19},
  doi          = {10.1007/978-3-319-70500-2\_19},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/LindellR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LiuZ17,
  author       = {Qipeng Liu and
                  Mark Zhandry},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Decomposable Obfuscation: {A} Framework for Building Applications
                  of Obfuscation from Polynomial Hardness},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {138--169},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_6},
  doi          = {10.1007/978-3-319-70500-2\_6},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LiuZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LombardiV17,
  author       = {Alex Lombardi and
                  Vinod Vaikuntanathan},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Limits on the Locality of Pseudorandom Generators and Applications
                  to Indistinguishability Obfuscation},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {119--137},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_5},
  doi          = {10.1007/978-3-319-70500-2\_5},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/LombardiV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LovettZ17,
  author       = {Shachar Lovett and
                  Jiapeng Zhang},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {On the Impossibility of Entropy Reversal, and Its Application to Zero-Knowledge
                  Proofs},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {31--55},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_2},
  doi          = {10.1007/978-3-319-70500-2\_2},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LovettZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Wee17,
  author       = {Hoeteck Wee},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Attribute-Hiding Predicate Encryption in Bilinear Groups, Revisited},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {206--233},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_8},
  doi          = {10.1007/978-3-319-70500-2\_8},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Wee17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2017-1,
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2},
  doi          = {10.1007/978-3-319-70500-2},
  isbn         = {978-3-319-70499-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2017-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics