Pages that link to "Item:Q1784107"
From MaRDI portal
The following pages link to GGH15 beyond permutation branching programs: proofs, attacks, and candidates (Q1784107):
Displaying 29 items.
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps (Q831181) (← links)
- Obfuscating finite automata (Q832331) (← links)
- Traitor-tracing from LWE made simple and attribute-based (Q1631335) (← links)
- Return of GGH15: provable security against zeroizing attacks (Q1631349) (← links)
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE (Q2055603) (← links)
- Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification (Q2056782) (← links)
- Candidate obfuscation via oblivious LWE sampling (Q2056783) (← links)
- Adventures in crypto dark matter: attacks and fixes for weak pseudorandom functions (Q2061985) (← links)
- Adaptively secure constrained pseudorandom functions in the standard model (Q2096499) (← links)
- Collusion resistant watermarkable PRFs from standard assumptions (Q2096500) (← links)
- On succinct arguments and witness encryption from groups (Q2096510) (← links)
- (Commit-and-prove) predictable arguments with privacy (Q2096627) (← links)
- Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration (Q2128558) (← links)
- Simpler constructions of asymmetric primitives from obfuscation (Q2152062) (← links)
- Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions (Q2161418) (← links)
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions (Q2170046) (← links)
- Matrix PRFs: constructions, attacks, and applications to obfuscation (Q2175904) (← links)
- Adaptively secure inner product encryption from LWE (Q2691591) (← links)
- ABE for DFA from LWE against bounded collusions, revisited (Q2697861) (← links)
- Weak Zero-Knowledge beyond the Black-Box Barrier (Q5026393) (← links)
- Collusion Resistant Traitor Tracing from Learning with Errors (Q5130846) (← links)
- Watermarking cryptographic functionalities from standard lattice assumptions (Q5918350) (← links)
- Obfustopia built on secret-key functional encryption (Q5925547) (← links)
- Revocable cryptography from learning with errors (Q6587947) (← links)
- Witness encryption for succinct functional commitments and applications (Q6635767) (← links)
- A general framework for lattice-based ABE using evasive inner-product functional encryption (Q6636517) (← links)
- Software with certified deletion (Q6637521) (← links)
- Time-lock puzzles from lattices (Q6652906) (← links)
- Adaptively sound zero-knowledge SNARKs for UP (Q6660292) (← links)