Constrained (Verifiable) Pseudorandom Function from Functional Encryption (Q6163657): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-319-99807-7_9 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2891331077 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained PRFs for Unbounded Inputs with Short Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained PRFs for Unbounded Inputs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Compact Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Homomorphic Constrained Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constraining Pseudorandom Functions Privately / rank
 
Normal rank
Property / cites work
 
Property / cites work: Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption: Definitions and Challenges / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained Pseudorandom Functions and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Signatures and Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Multilinear Maps over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained Pseudorandom Functions for Unconstrained Inputs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constrained Verifiable Random Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptive Security of Constrained PRFs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking the Sub-Exponential Barrier in Obfustopia / rank
 
Normal rank
Property / cites work
 
Property / cites work: Single-Key to Multi-Key Functional Encryption with Polynomial Loss / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption with Bounded Collusions via Multi-party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Predicate Encryption for Circuits from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to use indistinguishability obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Punctured Programming Approach to Adaptively Secure Functional Encryption / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 13:06, 1 August 2024

scientific article; zbMATH DE number 7704765
Language Label Description Also known as
English
Constrained (Verifiable) Pseudorandom Function from Functional Encryption
scientific article; zbMATH DE number 7704765

    Statements

    Constrained (Verifiable) Pseudorandom Function from Functional Encryption (English)
    0 references
    0 references
    30 June 2023
    0 references
    constrained pseudorandom function
    0 references
    constrained verifiable pseudorandom function
    0 references
    functional encryption
    0 references
    polynomial hardness
    0 references

    Identifiers