Pages that link to "Item:Q2874518"
From MaRDI portal
The following pages link to Witness Encryption from Instance Independent Assumptions (Q2874518):
Displaying 21 items.
- Impossibility of order-revealing encryption in idealized models (Q1631321) (← links)
- Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs (Q1791668) (← links)
- How to build time-lock encryption (Q1791669) (← links)
- Obfuscating circuits via composite-order graded encoding (Q2039401) (← links)
- Candidate obfuscation via oblivious LWE sampling (Q2056783) (← links)
- Abuse resistant law enforcement access systems (Q2056806) (← links)
- On succinct arguments and witness encryption from groups (Q2096510) (← links)
- Practical witness-key-agreement for blockchain-based dark pools financial trading (Q2147265) (← links)
- Survey of information security (Q2385398) (← links)
- Secret-sharing for NP (Q2397445) (← links)
- Cryptanalysis of the CLT13 multilinear map (Q2423847) (← links)
- Indistinguishability Obfuscation: From Approximate to Exact (Q2796119) (← links)
- How to Avoid Obfuscation Using Witness PRFs (Q2799104) (← links)
- Functional Encryption Without Obfuscation (Q2799106) (← links)
- Offline Witness Encryption (Q2822676) (← links)
- Shorter Circuit Obfuscation in Challenging Security Models (Q2827739) (← links)
- Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions (Q5738969) (← links)
- Cryptography with Updates (Q5738983) (← links)
- Universally composable auditable surveillance (Q6562576) (← links)
- Cuckoo commitments: registration-based encryption and key-value map commitments for large spaces (Q6604928) (← links)
- Witness encryption for succinct functional commitments and applications (Q6635767) (← links)