Constrained pseudorandom functions from functional encryption (Q2290626): Difference between revisions

From MaRDI portal
Created claim: Wikidata QID (P12): Q122986223, #quickstatements; #temporary_batch_1708296850199
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.tcs.2019.12.004 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2994422363 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained PRFs for Unbounded Inputs with Short Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained PRFs for Unbounded Inputs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Compact Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Obfuscating Circuits via Composite-Order Graded Encoding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Homomorphic Constrained Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Obfuscation against Algebraic Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the (im)possibility of obfuscating programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Cryptomania to Obfustopia Through Secret-Key Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private Puncturable PRFs from Standard Lattice Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constraining Pseudorandom Functions Privately / rank
 
Normal rank
Property / cites work
 
Property / cites work: Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Function-Private Subspace-Membership Encryption and Its Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption: Definitions and Challenges / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained Pseudorandom Functions and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Signatures and Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalyses of Candidate Branching Program Obfuscators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the New CLT Multilinear Map over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Multilinear Map over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of GGH15 Multilinear Maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Multilinear Maps Over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Multilinear Maps over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained (Verifiable) Pseudorandom Function from Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained Pseudorandom Functions for Unconstrained Inputs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained Verifiable Random Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptive Security of Constrained PRFs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption Without Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Witness encryption and its applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking the Sub-Exponential Barrier in Obfustopia / rank
 
Normal rank
Property / cites work
 
Property / cites work: Single-Key to Multi-Key Functional Encryption with Polynomial Loss / rank
 
Normal rank
Property / cites work
 
Property / cites work: Graph-Induced Multilinear Maps from Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3729902 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reusable garbled circuits and succinct functional encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption with Bounded Collusions via Multi-party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Predicate Encryption for Circuits from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption for Randomized Functionalities / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Generate and Use Universal Samplers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptively secure constrained pseudorandom functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of GGH Map / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Minicrypt to Obfustopia via Private-Key Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to use indistinguishability obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Punctured Programming Approach to Adaptively Secure Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Obfuscate Programs Directly / rank
 
Normal rank

Latest revision as of 14:08, 21 July 2024

scientific article
Language Label Description Also known as
English
Constrained pseudorandom functions from functional encryption
scientific article

    Statements

    Constrained pseudorandom functions from functional encryption (English)
    0 references
    0 references
    29 January 2020
    0 references
    constrained pseudorandom function
    0 references
    constrained verifiable pseudorandom function
    0 references
    private programable pseudorandom function
    0 references
    functional encryption
    0 references
    polynomial hardness
    0 references
    0 references

    Identifiers