All      Bounded Storage Model      Deterministic Encryption      Differential Privacy      Indifferentiability      Multilinear Maps      Obfuscation      Order-Revealing Encryption      Quantum      Traitor Tracing   
[KMUZ16] Strong Hardness of Privacy from Weak Traitor Tracing
By Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, and Mark Zhandry
TCC 2016-B
[BZ16] Order-Revealing Encryption and the Hardness of Private Learning
By Mark Bun and Mark Zhandry
TCC 2016-A
[BZ14] Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
By Dan Boneh and Mark Zhandry
[ePrint]  [slides]