Secure software leasing
From MaRDI portal
Publication:2056750
Cites work
- scientific article; zbMATH DE number 3825698 (Why is no real title available?)
- scientific article; zbMATH DE number 1842483 (Why is no real title available?)
- scientific article; zbMATH DE number 1842511 (Why is no real title available?)
- A Pseudorandom Generator from any One-way Function
- Candidate iO from homomorphic encryption schemes
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Candidate obfuscation via oblivious LWE sampling
- Lattice-based fully dynamic multi-key FHE with short ciphertexts
- Obfuscation for evasive functions
- On perfect correctness in (lockable) obfuscation
- On the impossibility of approximate obfuscation and applications to resettable cryptography
- One-shot signatures and applications to hybrid quantum/classical authentication
- Post-quantum zero knowledge in constant rounds
- Quantum FHE (almost) as secure as classical
- Quantum lightning never strikes the same state twice
- Quantum money from knots
- Quantum one-time programs. (Extended abstract)
- Uncloneable encryption
- Weak zero-knowledge beyond the black-box barrier
Cited in
(30)- Another round of breaking and making quantum money: how to not build it from lattices, and more
- Public key encryption with secure key leasing
- Quantum private function evaluation
- On the (im)plausibility of public-key quantum money from collision-resistant hash functions
- Hidden cosets and applications to unclonable cryptography
- Impossibility of quantum virtual black-box obfuscation of classical circuits
- New approaches for quantum copy-protection
- On the round complexity of secure quantum computation
- Publicly verifiable deletion from minimal assumptions
- Revocable cryptography from learning with errors
- Semi-quantum copy-protection and more
- Secure software leasing without assumptions
- Collusion resistant copy-protection for watermarkable functionalities
- Cloning games: a general framework for unclonable primitives
- Publicly-verifiable deletion via target-collapsing functions
- Unclonable polymers and their cryptographic applications
- Watermarking PRFs against quantum adversaries
- Functional encryption with secure key leasing
- Certified everlasting secure collusion-resistant functional encryption, and more
- Software with certified deletion
- Constructions for quantum indistinguishability obfuscation
- Secure software leasing from standard assumptions
- Unclonable encryption, revisited
- A modular approach to unclonable cryptography
- Obfuscation of pseudo-deterministic quantum circuits
- On the feasibility of unclonable encryption, and more
- Post-quantum resettably-sound zero knowledge
- Disappearing cryptography in the bounded storage model
- Watermarking PRFs and PKE against quantum adversaries
- One-out-of-many unclonable cryptography: definitions, constructions, and more
This page was built for publication: Secure software leasing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2056750)