Theory of Cryptography -

Theory of Cryptography

20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II
Buch | Softcover
XIII, 811 Seiten
2022 | 1st ed. 2022
Springer International Publishing (Verlag)
978-3-031-22364-8 (ISBN)
181,89 inkl. MwSt
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption;

The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption; multi-party computation; protocols: key agreement and commitments; theory: sampling and friends; lattices; anonymity, verfiability and robustness; ORAM, OT and PIR; and theory.

Encryption.- Multi-party computation.- Protocols: key agreement and commitments.- Theory: sampling and friends.- Lattices.- Anonymity, Verfiability and robustness.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XIII, 811 p. 81 illus., 13 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 1246 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte authentication • ciphertexts • Communication • Computational Complexity • Computer Networks • Computer Science • Computer Security • Computer systems • cryptography • Data Mining • Data Security • Encryption • Engineering • Internet • Mathematics • Network Protocols • Network Security • privacy • privacy preserving • Public Key Cryptography • security • Signal Processing
ISBN-10 3-031-22364-0 / 3031223640
ISBN-13 978-3-031-22364-8 / 9783031223648
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich