Theory of cryptography : 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, proceedings. Part III / Eike Kiltz, Vinod Vaikuntanathan (eds.).
2022
QA76.9.A25
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Theory of cryptography : 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, proceedings. Part III / Eike Kiltz, Vinod Vaikuntanathan (eds.).
ISBN
9783031223686 (electronic bk.)
3031223683 (electronic bk.)
9783031223679
3031223675
3031223683 (electronic bk.)
9783031223679
3031223675
Published
Cham : Springer, [2022]
Copyright
©2022
Language
English
Description
1 online resource (x, 245 pages) : illustrations (some color).
Item Number
10.1007/978-3-031-22368-6 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8/2
Summary
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption; multi-party computation; protocols: key agreement and commitments; theory: sampling and friends; lattices; anonymity, verfiability and robustness; ORAM, OT and PIR; and theory.
Note
International conference proceedings.
Bibliography, etc. Note
Includes bibliographical references.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed January 6, 2023).
Added Author
Kiltz, Eike, editor.
Vaikuntanathan, Vinod, editor.
Vaikuntanathan, Vinod, editor.
Series
Lecture notes in computer science ; 13749. 1611-3349
Available in Other Form
Print version: 9783031223679
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Verifiable Private Information Retrieval
Random-Index Oblivious RAM
On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR
Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions
One-Time Programs from Commodity Hardware
Universal Reductions: Reductions Relative to Stateful Oracles
Permissionless Clock Synchronization with Public Setup
Beyond Uber: Instantiating Generic Groups via PGGs. .
Random-Index Oblivious RAM
On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR
Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions
One-Time Programs from Commodity Hardware
Universal Reductions: Reductions Relative to Stateful Oracles
Permissionless Clock Synchronization with Public Setup
Beyond Uber: Instantiating Generic Groups via PGGs. .