001452063 000__ 03498cam\a2200589\i\4500 001452063 001__ 1452063 001452063 003__ OCoLC 001452063 005__ 20230310003339.0 001452063 006__ m\\\\\o\\d\\\\\\\\ 001452063 007__ cr\cn\nnnunnun 001452063 008__ 230106s2022\\\\sz\a\\\\ob\\\\101\0\eng\d 001452063 019__ $$a1355865974$$a1356009283 001452063 020__ $$a9783031223686$$q(electronic bk.) 001452063 020__ $$a3031223683$$q(electronic bk.) 001452063 020__ $$z9783031223679 001452063 020__ $$z3031223675 001452063 0247_ $$a10.1007/978-3-031-22368-6$$2doi 001452063 035__ $$aSP(OCoLC)1356967512 001452063 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dEBLCP$$dOCLCQ$$dBRX 001452063 049__ $$aISEA 001452063 050_4 $$aQA76.9.A25 001452063 08204 $$a005.8/2$$223/eng/20230106 001452063 1112_ $$aTheory of Cryptography Conference$$n(20th :$$d2022 :$$cChicago, Ill.). 001452063 24510 $$aTheory of cryptography :$$b20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, proceedings.$$nPart III /$$cEike Kiltz, Vinod Vaikuntanathan (eds.). 001452063 24630 $$aTCC 2022 001452063 264_1 $$aCham :$$bSpringer,$$c[2022] 001452063 264_4 $$c©2022 001452063 300__ $$a1 online resource (x, 245 pages) :$$billustrations (some color). 001452063 336__ $$atext$$btxt$$2rdacontent 001452063 337__ $$acomputer$$bc$$2rdamedia 001452063 338__ $$aonline resource$$bcr$$2rdacarrier 001452063 4901_ $$aLecture notes in computer science,$$x1611-3349 ;$$v13749 001452063 500__ $$aInternational conference proceedings. 001452063 504__ $$aIncludes bibliographical references. 001452063 5050_ $$aVerifiable Private Information Retrieval -- Random-Index Oblivious RAM -- On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR -- Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions -- One-Time Programs from Commodity Hardware -- Universal Reductions: Reductions Relative to Stateful Oracles -- Permissionless Clock Synchronization with Public Setup -- Beyond Uber: Instantiating Generic Groups via PGGs. . 001452063 506__ $$aAccess limited to authorized users. 001452063 520__ $$aThe three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption; multi-party computation; protocols: key agreement and commitments; theory: sampling and friends; lattices; anonymity, verfiability and robustness; ORAM, OT and PIR; and theory. 001452063 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed January 6, 2023). 001452063 650_0 $$aData encryption (Computer science)$$vCongresses. 001452063 650_0 $$aCryptography$$vCongresses. 001452063 655_0 $$aElectronic books. 001452063 655_7 $$aConference papers and proceedings.$$2lcgft 001452063 7001_ $$aKiltz, Eike,$$eeditor. 001452063 7001_ $$aVaikuntanathan, Vinod,$$eeditor. 001452063 77608 $$iPrint version: $$z3031223675$$z9783031223679$$w(OCoLC)1349088334 001452063 830_0 $$aLecture notes in computer science ;$$v13749.$$x1611-3349 001452063 852__ $$bebk 001452063 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-22368-6$$zOnline Access$$91397441.1 001452063 909CO $$ooai:library.usi.edu:1452063$$pGLOBAL_SET 001452063 980__ $$aBIB 001452063 980__ $$aEBOOK 001452063 982__ $$aEbook 001452063 983__ $$aOnline 001452063 994__ $$a92$$bISE