Pages that link to "Item:Q2816296"
From MaRDI portal
The following pages link to Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits (Q2816296):
Displaying 50 items.
- Universal proxy re-encryption (Q2061932) (← links)
- Multi-client functional encryption for separable functions (Q2061944) (← links)
- BETA: biometric-enabled threshold authentication (Q2061958) (← links)
- Functional encryption for set intersection in the multi-client setting (Q2068378) (← links)
- Verifiable registration-based encryption (Q2096501) (← links)
- New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings (Q2096502) (← links)
- Amplifying the security of functional encryption, unconditionally (Q2096505) (← links)
- On succinct arguments and witness encryption from groups (Q2096510) (← links)
- (Commit-and-prove) predictable arguments with privacy (Q2096627) (← links)
- Fiat-Shamir for repeated squaring with applications to PPAD-hardness and VDFs (Q2104234) (← links)
- Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration (Q2128558) (← links)
- Three-round secure multiparty computation from black-box two-round oblivious transfer (Q2128560) (← links)
- On the round complexity of black-box secure MPC (Q2128561) (← links)
- Pushing the limits of Valiant's universal circuits: simpler, tighter and more compact (Q2128569) (← links)
- Deniable fully homomorphic encryption from learning with errors (Q2128579) (← links)
- Multi-input quadratic functional encryption from pairings (Q2139634) (← links)
- Constructions for quantum indistinguishability obfuscation (Q2146070) (← links)
- Attribute-based access control for inner product functional encryption from LWE (Q2146083) (← links)
- Practical witness-key-agreement for blockchain-based dark pools financial trading (Q2147265) (← links)
- Optimizing registration based encryption (Q2149790) (← links)
- Cross-domain attribute-based access control encryption (Q2149810) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Cryptanalysis of candidate obfuscators for affine determinant programs (Q2170024) (← links)
- Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\) (Q2170025) (← links)
- Incompressible cryptography (Q2170026) (← links)
- Unclonable polymers and their cryptographic applications (Q2170032) (← links)
- Distributed (correlation) samplers: how to remove a trusted dealer in one round (Q2170033) (← links)
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions (Q2170046) (← links)
- On the multi-user security of short Schnorr signatures with preprocessing (Q2170064) (← links)
- Dynamic collusion bounded functional encryption from identity-based encryption (Q2170069) (← links)
- From cryptomania to obfustopia through secret-key functional encryption (Q2175212) (← links)
- From minicrypt to obfustopia via private-key functional encryption (Q2175213) (← links)
- Matrix PRFs: constructions, attacks, and applications to obfuscation (Q2175904) (← links)
- Obfuscated fuzzy Hamming distance and conjunctions from subset product problems (Q2175905) (← links)
- Predicate encryption from bilinear maps and one-sided probabilistic rank (Q2175910) (← links)
- Attribute based encryption for deterministic finite automata from DLIN (Q2175933) (← links)
- Permuted puzzles and cryptographic hardness (Q2175950) (← links)
- Public-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applications (Q2179397) (← links)
- Multilinear maps from obfuscation (Q2188963) (← links)
- Efficient and scalable universal circuits (Q2188968) (← links)
- Public key encryption with equality test from generic assumptions in the random oracle model (Q2215090) (← links)
- Functional broadcast encryption with applications to data sharing for cloud storage (Q2224865) (← links)
- Random walks and concurrent zero-knowledge (Q2229263) (← links)
- Offline witness encryption with semi-adaptive security (Q2229274) (← links)
- Constrained pseudorandom functions from functional encryption (Q2290626) (← links)
- Leakage resilience from program obfuscation (Q2318088) (← links)
- The magic of ELFs (Q2318089) (← links)
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation (Q2319626) (← links)
- Survey of information security (Q2385398) (← links)
- Secret-sharing for NP (Q2397445) (← links)