Theory of cryptography 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, proceedings
Verifiable Private Information Retrieval.- Random-Index Oblivious RAM.- On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR.- Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions.- One-Time Programs from Commodity Hardware.- Universal Red...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , |
Format: | UnknownFormat |
Sprache: | eng |
Veröffentlicht: |
Cham
Springer
2022
|
Schriftenreihe: | Lecture notes in computer science
|
Schlagworte: |
Angewandte Informatik
> COMPUTERS / Data Processing / Storage & Retrieval
> COMPUTERS / Hardware / Network Hardware
> COMPUTERS / Information Technology
> COMPUTERS / Networking / Security
> COMPUTERS / Security / General
> Coding theory & cryptology
> Computer security
> Computersicherheit
> Data Warehousing
> Information retrieval
> Informationsrückgewinnung, Information Retrieval
> Kodierungstheorie und Verschlüsselung (Kryptologie)
> Kryptografie, Verschlüsselungstechnologie
> Network hardware
> Network security
> Netzwerk-Hardware
> Netzwerksicherheit
> Konferenzschrift
|
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Verifiable Private Information Retrieval.- Random-Index Oblivious RAM.- On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR.- Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions.- One-Time Programs from Commodity Hardware.- Universal Reductions: Reductions Relative to Stateful Oracles.- Permissionless Clock Synchronization with Public Setup.- Beyond Uber: Instantiating Generic Groups via PGGs. The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption; multi-party computation; protocols: key agreement and commitments; theory: sampling and friends; lattices; anonymity, verfiability and robustness; ORAM, OT and PIR; and theory |
---|