Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part II

Author:   Benny Applebaum ,  Huijia (Rachel) Lin
Publisher:   Springer Nature Switzerland AG
ISBN:  

9783032122926


Pages:   531
Publication Date:   02 December 2025
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $211.17 Quantity:  
Add to Cart

Share |

Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part II


Overview

The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.The total of 70 full papers presented in the proceedings was carefully reviewed and selected from 242 submissions. They were organized in topical sections as follows: Part I: Secure Computation; Homomorphic Primitives; Proofs;  Part II: Foundations; Obfuscation and Functional Encryption; Secret Sharing; Part III: Quantum Cryptography; Signatures and Intractability Assumptions;  Part IV: Proofs; Young Researcher Award and Outstanding Paper Awards; Differential Privacy; Times Cryptography and Verifiable Random Function; Secure Computation.

Full Product Details

Author:   Benny Applebaum ,  Huijia (Rachel) Lin
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
ISBN:  

9783032122926


ISBN 10:   3032122929
Pages:   531
Publication Date:   02 December 2025
Audience:   College/higher education ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

.- Foundations. .- Offline-Online Indifferentiability of Cryptographic Systems. .- Seedless Condensers for Efficiently Samplable Sources. .- Incompressible Encryption with Everlasting Security. .- Relationships among FuncCPA and Its Related Notions. .- Lower Bounds on Inner-Product Functional Encryption from All-or-Nothing Encryption Primitives. .- A Meta-Complexity Theoretic Approach to Indistinguishability Obfuscation and Witness Pseudo-Canonicalization. .- Obfuscation and Functional Encryption. .- Obfuscating Pseudorandom Functions is Post-Quantum Complete. .- Pseudorandom FE and iO with Applications. .- Zeroizing Attacks against Evasive and Circular Evasive LWE. .- (Multi-Input) FE for Randomized Functionalities, Revisited. .- Adaptively Secure Streaming Functional Encryption. .- Secret Sharing. .- Simplified PIR and CDS Protocols and Improved Linear Secret-Sharing Schemes. .- Deniable Secret Sharing. .- Polynomial Secret Sharing Schemes and Algebraic Matroids. .- Pseudorandom Correlation Functions for Garbled Circuits. .-  Multiparty Homomorphic Secret Sharing and More from LPN and MQ.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List