All     Bounded Storage Model     Deterministic Encryption     Differential Privacy     Indifferentiability     Multilinear Maps     Obfuscation     Order-Revealing Encryption     Quantum     Traitor Tracing  
[KMUZ16] Strong Hardness of Privacy from Weak Traitor Tracing
By Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, and Mark Zhandry
TCC 2016-B
[BZ16] Order-Revealing Encryption and the Hardness of Private Learning
By Mark Bun and Mark Zhandry
TCC 2016-A
[BZ14] Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
By Dan Boneh and Mark Zhandry
[ePrint]  [slides]