001440833 000__ 04059cam\a2200661\i\4500 001440833 001__ 1440833 001440833 003__ OCoLC 001440833 005__ 20230309004704.0 001440833 006__ m\\\\\o\\d\\\\\\\\ 001440833 007__ cr\cn\nnnunnun 001440833 008__ 211109s2021\\\\sz\a\\\\o\\\\\101\0\eng\d 001440833 019__ $$a1292517684$$a1294357442 001440833 020__ $$a9783030904562$$q(electronic bk.) 001440833 020__ $$a3030904563$$q(electronic bk.) 001440833 020__ $$z9783030904555$$q(print) 001440833 0247_ $$a10.1007/978-3-030-90456-2$$2doi 001440833 035__ $$aSP(OCoLC)1284916332 001440833 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dOCLCF$$dOCLCO$$dDKU$$dDCT$$dOCLCQ$$dCOM$$dOCLCO$$dOCLCQ 001440833 049__ $$aISEA 001440833 050_4 $$aQA76.9.A25 001440833 08204 $$a005.8/24$$223 001440833 1112_ $$aTheory of Cryptography Conference$$n(19th :$$d2021 :$$cRaleigh, N.C.) 001440833 24510 $$aTheory of cryptography :$$b19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings.$$nPart III /$$cKobbi Nissim, Brent Waters (eds.). 001440833 2463_ $$aTCC 2021 001440833 264_1 $$aCham, Switzerland :$$bSpringer,$$c2021. 001440833 300__ $$a1 online resource (xii, 515 pages) :$$billustrations (some color) 001440833 336__ $$atext$$btxt$$2rdacontent 001440833 337__ $$acomputer$$bc$$2rdamedia 001440833 338__ $$aonline resource$$bcr$$2rdacarrier 001440833 347__ $$atext file 001440833 347__ $$bPDF 001440833 4901_ $$aLecture notes in computer science ;$$v13044 001440833 4901_ $$aLNCS sublibrary, SL 4, Security and cryptology 001440833 500__ $$aIncludes author index. 001440833 5050_ $$aCovert Learning: How to Learn with an Untrusted Intermediary -- Random-Index PIR and Applications -- Forward Secret Encrypted RAM: Lower Bounds and Applications -- Laconic Private Set Intersection and Applications -- Amortizing Rate-1 OT and Applications to PIR and PSI -- Ring-based Identity Based Encryption { Asymptotically Shorter MPK and Tighter Security -- Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption -- Grafting Key Trees: Efficient Key Management for Overlapping Groups -- Updatable Public Key Encryption in the Standard Model -- Towards Tight Adaptive Security of Non-Interactive Key Exchange -- On the Impossibility of Purely Algebraic Signatures -- Policy-Compliant Signatures -- Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions -- Non-Malleable Vector Commitments via Local Equivocability -- Non-Malleable Time-Lock Puzzles and Applications -- Vector and Functional Commitments from Lattices.- 001440833 506__ $$aAccess limited to authorized users. 001440833 520__ $$aThe three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication. 001440833 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed November 9, 2021). 001440833 650_0 $$aData encryption (Computer science)$$vCongresses. 001440833 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001440833 650_6 $$aChiffrement (Informatique)$$vCongrès. 001440833 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures$$vCongrès. 001440833 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001440833 655_7 $$aConference papers and proceedings.$$2lcgft 001440833 655_7 $$aActes de congrès.$$2rvmgf 001440833 655_0 $$aElectronic books. 001440833 7001_ $$aNissim, Kobbi,$$eeditor. 001440833 7001_ $$aWaters, Brent R.,$$d1978-$$eeditor. 001440833 77608 $$iPrint version: $$z9783030904555 001440833 77608 $$iPrint version: $$z9783030904579 001440833 830_0 $$aLecture notes in computer science ;$$v13044. 001440833 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 001440833 852__ $$bebk 001440833 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-90456-2$$zOnline Access$$91397441.1 001440833 909CO $$ooai:library.usi.edu:1440833$$pGLOBAL_SET 001440833 980__ $$aBIB 001440833 980__ $$aEBOOK 001440833 982__ $$aEbook 001440833 983__ $$aOnline 001440833 994__ $$a92$$bISE