Pages that link to "Item:Q1690195"
From MaRDI portal
The following pages link to Private constrained PRFs (and more) from LWE (Q1690195):
Displaying 23 items.
- Traitor-tracing from LWE made simple and attribute-based (Q1631335) (← links)
- Watermarking PRFs under standard assumptions: public marking and security with extraction queries (Q1631357) (← links)
- Private information retrieval with sublinear online time (Q2055601) (← links)
- Candidate obfuscation via oblivious LWE sampling (Q2056783) (← links)
- Round-optimal verifiable oblivious pseudorandom functions from ideal lattices (Q2061957) (← links)
- Adaptively secure constrained pseudorandom functions in the standard model (Q2096499) (← links)
- Collusion resistant watermarkable PRFs from standard assumptions (Q2096500) (← links)
- Key-homomorphic pseudorandom functions from LWE with small modulus (Q2119025) (← links)
- Puncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and time (Q2139652) (← links)
- Function-private conditional disclosure of secrets and multi-evaluation threshold distributed point functions (Q2149832) (← links)
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597) (← links)
- Pseudorandom functions in NC class from the standard LWE assumption (Q2243895) (← links)
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation (Q2319626) (← links)
- Adaptively secure inner product encryption from LWE (Q2691591) (← links)
- Succinct LWE sampling, random polynomials, and obfuscation (Q2697860) (← links)
- Constraining and Watermarking PRFs from Milder Assumptions (Q5041166) (← links)
- Watermarking cryptographic functionalities from standard lattice assumptions (Q5918350) (← links)
- Watermarking PRFs and PKE against quantum adversaries (Q6536747) (← links)
- Near-optimal private information retrieval with preprocessing (Q6582182) (← links)
- Lattice-based functional commitments: fast verification and cryptanalysis (Q6604929) (← links)
- Efficient pre-processing PIR without public-key cryptography (Q6637568) (← links)
- Laconic function evaluation and ABE for RAMs from (Ring-)LWE (Q6652894) (← links)
- Attribute based encryption for Turing machines from lattices (Q6652903) (← links)