Theory of Cryptography

Theory of Cryptography

19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part III

Nissim, Kobbi; Waters, Brent

Springer Nature Switzerland AG

11/2021

515

Mole

Inglês

9783030904555

15 a 20 dias

801

Descrição não disponível.
Covert Learning: How to Learn with an Untrusted Intermediary.- Random-Index PIR and Applications.- Forward Secret Encrypted RAM: Lower Bounds and Applications.- Laconic Private Set Intersection and Applications.- Amortizing Rate-1 OT and Applications to PIR and PSI.- Ring-based Identity Based Encryption { Asymptotically Shorter MPK and Tighter Security.- Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption.- Grafting Key Trees: Efficient Key Management for Overlapping Groups.- Updatable Public Key Encryption in the Standard Model.- Towards Tight Adaptive Security of Non-Interactive Key Exchange.- On the Impossibility of Purely Algebraic Signatures.- Policy-Compliant Signatures.- Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions.- Non-Malleable Vector Commitments via Local Equivocability.- Non-Malleable Time-Lock Puzzles and Applications.- Vector and Functional Commitments from Lattices.-
ciphertexts;communication;computer networks;computer security;computer systems;data communication systems;data security;Human-Computer Interaction (HCI);network protocols;network security;public key cryptography