Pages that link to "Item:Q5738886"
From MaRDI portal
The following pages link to Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE (Q5738886):
Displaying 22 items.
- Traitor-tracing from LWE made simple and attribute-based (Q1631335) (← links)
- Return of GGH15: provable security against zeroizing attacks (Q1631349) (← links)
- Watermarking PRFs under standard assumptions: public marking and security with extraction queries (Q1631357) (← links)
- Faster Gaussian sampling for trapdoor lattices with arbitrary modulus (Q1648788) (← links)
- Private information retrieval with sublinear online time (Q2055601) (← links)
- New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertexts (Q2056698) (← links)
- Round-optimal verifiable oblivious pseudorandom functions from ideal lattices (Q2061957) (← links)
- Adaptively secure constrained pseudorandom functions in the standard model (Q2096499) (← links)
- Collusion resistant watermarkable PRFs from standard assumptions (Q2096500) (← links)
- Key-homomorphic pseudorandom functions from LWE with small modulus (Q2119025) (← links)
- Puncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and time (Q2139652) (← links)
- Function-private conditional disclosure of secrets and multi-evaluation threshold distributed point functions (Q2149832) (← links)
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions (Q2170046) (← links)
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597) (← links)
- Pseudorandom functions in NC class from the standard LWE assumption (Q2243895) (← links)
- Constrained pseudorandom functions from functional encryption (Q2290626) (← links)
- Adaptively secure inner product encryption from LWE (Q2691591) (← links)
- Constraining and Watermarking PRFs from Milder Assumptions (Q5041166) (← links)
- Collusion Resistant Traitor Tracing from Learning with Errors (Q5130846) (← links)
- Private Puncturable PRFs from Standard Lattice Assumptions (Q5738885) (← links)
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE (Q5738886) (← links)
- Watermarking cryptographic functionalities from standard lattice assumptions (Q5918350) (← links)