Theory of Cryptography

Theory of Cryptography

4.11 - 1251 ratings - Source

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.KeyGen (msk, C) a€” sko : The key generation algorithm gets as input msk and a predicate specified by C a‚n C (of depth at most d). ... We allow the adversary to make multiple challenge message queries, which is equivalent to the single query case but will be easier for us to work with. ... KeyGen (msk, ) satisfies C(x, ) = 0 for all i (that is, sko does not decrypt the ciphertext corresponding to any of the xi).

Title:Theory of Cryptography
Author:Yevgeniy Dodis, Jesper Buus Nielsen
Publisher:Springer - 2015-03-09


You Must CONTINUE and create a free account to access unlimited downloads & streaming