Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Theory of Cryptography -

Theory of Cryptography

23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part II
Buch | Softcover
XIV, 531 Seiten
2025
Springer International Publishing (Verlag)
978-3-032-12292-6 (ISBN)
CHF 109,95 inkl. MwSt
  • Noch nicht erschienen - erscheint am 23.12.2025
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken

The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1 5, 2025.The total of 70 full papers presented in the proceedings was carefully reviewed and selected from 242 submissions. They were organized in topical sections as follows:

Part I: Secure Computation; Homomorphic Primitives; Proofs; 

Part II: Foundations; Obfuscation and Functional Encryption; Secret Sharing;

Part III: Quantum Cryptography; Signatures and Intractability Assumptions; 

Part IV: Proofs; Young Researcher Award and Outstanding Paper Awards; Differential Privacy; Times Cryptography and Verifiable Random Function; Secure Computation.

.- Foundations.
.- Offline-Online Indifferentiability of Cryptographic Systems.
.- Seedless Condensers for Efficiently Samplable Sources.
.- Incompressible Encryption with Everlasting Security.
.- Relationships among FuncCPA and Its Related Notions.
.- Lower Bounds on Inner-Product Functional Encryption from All-or-Nothing Encryption Primitives.
.- A Meta-Complexity Theoretic Approach to Indistinguishability Obfuscation and Witness Pseudo-Canonicalization.
.- Obfuscation and Functional Encryption.
.- Obfuscating Pseudorandom Functions is Post-Quantum Complete.
.- Pseudorandom FE and iO with Applications.
.- Zeroizing Attacks against Evasive and Circular Evasive LWE.
.- (Multi-Input) FE for Randomized Functionalities, Revisited.
.- Adaptively Secure Streaming Functional Encryption.
.- Secret Sharing.
.- Simplified PIR and CDS Protocols and Improved Linear Secret-Sharing Schemes.
.- Deniable Secret Sharing.
.- Polynomial Secret Sharing Schemes and Algebraic Matroids.
.- Pseudorandom Correlation Functions for Garbled Circuits.
.-  Multiparty Homomorphic Secret Sharing and More from LPN and MQ.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XIV, 531 p. 23 illus., 15 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte authentication • black-box separations • Consensus • cryptographic foundations • cryptographic proofs • cryptography • differential privacy • homomorphic primitives • information-theoretic cryptography • obfuscation • proof systems • Pseudorandomness • Quantum Cryptography • Secret Sharing • secure multi-party computation • theory
ISBN-10 3-032-12292-9 / 3032122929
ISBN-13 978-3-032-12292-6 / 9783032122926
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich