Pages that link to "Item:Q2922655"
From MaRDI portal
The following pages link to Constrained Verifiable Random Functions (Q2922655):
Displayed 12 items.
- Practical post-quantum few-time verifiable random function with applications to Algorand (Q2147263) (← links)
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves (Q2191198) (← links)
- KDM security for identity-based encryption: constructions and separations (Q2215124) (← links)
- Constrained pseudorandom functions from functional encryption (Q2290626) (← links)
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation (Q2319626) (← links)
- Verifiable Random Functions from Standard Assumptions (Q2796131) (← links)
- Verifiable Computation for Randomized Algorithm (Q3179479) (← links)
- Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation (Q5738765) (← links)
- Private Puncturable PRFs from Standard Lattice Assumptions (Q5738885) (← links)
- Verifiable random functions from non-interactive witness-indistinguishable proofs (Q5918799) (← links)
- Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness (Q6085266) (← links)
- Constrained (Verifiable) Pseudorandom Function from Functional Encryption (Q6163657) (← links)