|
|
|||
|
||||
OverviewThe four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.The total of 70 full papers presented in the proceedings was carefully reviewed and selected from 242 submissions. They were organized in topical sections as follows: Part I: Secure Computation; Homomorphic Primitives; Proofs; Part II: Foundations; Obfuscation and Functional Encryption; Secret Sharing; Part III: Quantum Cryptography; Signatures and Intractability Assumptions; Part IV: Proofs; Young Researcher Award and Outstanding Paper Awards; Differential Privacy; Times Cryptography and Verifiable Random Function; Secure Computation. Full Product DetailsAuthor: Benny Applebaum , Huijia (Rachel) LinPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG ISBN: 9783032122926ISBN 10: 3032122929 Pages: 531 Publication Date: 02 December 2025 Audience: College/higher education , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Active Availability: In Print This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contents.- Foundations. .- Offline-Online Indifferentiability of Cryptographic Systems. .- Seedless Condensers for Efficiently Samplable Sources. .- Incompressible Encryption with Everlasting Security. .- Relationships among FuncCPA and Its Related Notions. .- Lower Bounds on Inner-Product Functional Encryption from All-or-Nothing Encryption Primitives. .- A Meta-Complexity Theoretic Approach to Indistinguishability Obfuscation and Witness Pseudo-Canonicalization. .- Obfuscation and Functional Encryption. .- Obfuscating Pseudorandom Functions is Post-Quantum Complete. .- Pseudorandom FE and iO with Applications. .- Zeroizing Attacks against Evasive and Circular Evasive LWE. .- (Multi-Input) FE for Randomized Functionalities, Revisited. .- Adaptively Secure Streaming Functional Encryption. .- Secret Sharing. .- Simplified PIR and CDS Protocols and Improved Linear Secret-Sharing Schemes. .- Deniable Secret Sharing. .- Polynomial Secret Sharing Schemes and Algebraic Matroids. .- Pseudorandom Correlation Functions for Garbled Circuits. .- Multiparty Homomorphic Secret Sharing and More from LPN and MQ.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||