Secure software leasing
From MaRDI portal
Publication:2056750
DOI10.1007/978-3-030-77886-6_17OpenAlexW3173200671MaRDI QIDQ2056750FDOQ2056750
Authors: Rolando L. La Placa, Prabhanjan Ananth
Publication date: 8 December 2021
Full work available at URL: https://arxiv.org/abs/2005.05289
Cites Work
- Title not available (Why is that?)
- A Pseudorandom Generator from any One-way Function
- Title not available (Why is that?)
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Quantum money from knots
- Title not available (Why is that?)
- Obfuscation for evasive functions
- Quantum FHE (almost) as secure as classical
- On perfect correctness in (lockable) obfuscation
- Quantum one-time programs. (Extended abstract)
- Uncloneable encryption
- Lattice-based fully dynamic multi-key FHE with short ciphertexts
- On the impossibility of approximate obfuscation and applications to resettable cryptography
- One-shot signatures and applications to hybrid quantum/classical authentication
- Candidate iO from homomorphic encryption schemes
- Candidate obfuscation via oblivious LWE sampling
- Quantum lightning never strikes the same state twice
- Post-quantum zero knowledge in constant rounds
- Weak zero-knowledge beyond the black-box barrier
Cited In (30)
- Another round of breaking and making quantum money: how to not build it from lattices, and more
- Public key encryption with secure key leasing
- Quantum private function evaluation
- On the (im)plausibility of public-key quantum money from collision-resistant hash functions
- Hidden cosets and applications to unclonable cryptography
- Impossibility of quantum virtual black-box obfuscation of classical circuits
- New approaches for quantum copy-protection
- On the round complexity of secure quantum computation
- Publicly verifiable deletion from minimal assumptions
- Revocable cryptography from learning with errors
- Semi-quantum copy-protection and more
- Secure software leasing without assumptions
- Collusion resistant copy-protection for watermarkable functionalities
- Cloning games: a general framework for unclonable primitives
- Publicly-verifiable deletion via target-collapsing functions
- Unclonable polymers and their cryptographic applications
- Watermarking PRFs against quantum adversaries
- Functional encryption with secure key leasing
- Certified everlasting secure collusion-resistant functional encryption, and more
- Software with certified deletion
- Constructions for quantum indistinguishability obfuscation
- Secure software leasing from standard assumptions
- Unclonable encryption, revisited
- A modular approach to unclonable cryptography
- Obfuscation of pseudo-deterministic quantum circuits
- On the feasibility of unclonable encryption, and more
- Post-quantum resettably-sound zero knowledge
- Watermarking PRFs and PKE against quantum adversaries
- Disappearing cryptography in the bounded storage model
- One-out-of-many unclonable cryptography: definitions, constructions, and more
This page was built for publication: Secure software leasing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2056750)