Adaptively secure constrained pseudorandom functions in the standard model
From MaRDI portal
Publication:2096499
Recommendations
Cites work
- scientific article; zbMATH DE number 3960854 (Why is no real title available?)
- A Pseudorandom Generator from any One-way Function
- Adaptive Security of Constrained PRFs
- Adaptively secure constrained pseudorandom functions
- Adaptively secure distributed PRFs from LWE
- Adaptively secure puncturable pseudorandom functions in the standard model
- Adaptively single-key secure constrained PRFs for \(\text{NC}^1\)
- Advances in Cryptology – CRYPTO 2004
- All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE
- Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques
- Bonsai trees, or how to delegate a lattice basis
- Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups
- Constrained key-homomorphic PRFs from standard lattice assumptions. Or: how to secretly embed a circuit in your PRF
- Constrained pseudorandom functions and their applications
- Constraining pseudorandom functions privately
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient lattice (H)IBE in the standard model
- Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits
- Fully secure attribute-based encryption for \(t\)-CNF from LWE
- Functional signatures and pseudorandom functions
- GGH15 beyond permutation branching programs: proofs, attacks, and candidates
- How to use indistinguishability obfuscation
- Identity-based (lossy) trapdoor functions and applications
- Key homomorphic PRFs and their applications
- Key-homomorphic constrained pseudorandom functions
- Learning with rounding, revisited. New reduction, properties and applications
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- New and improved key-homomorphic pseudorandom functions
- Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR
- Number-theoretic constructions of efficient pseudo-random functions
- Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
- Private constrained PRFs (and more) from LWE
- Private puncturable PRFs from standard lattice assumptions
- Privately constraining and programming PRFs, the LWE way
- Pseudorandom Functions and Factoring
- Pseudorandom functions and lattices
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Trapdoors for lattices: simpler, tighter, faster, smaller
- Verifiable random functions from weaker assumptions
Cited in
(18)- Adaptively single-key secure constrained PRFs for \(\text{NC}^1\)
- Adaptively secure constrained pseudorandom functions
- The power of undirected rewindings for adaptive security
- Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups
- From non-adaptive to adaptive pseudorandom functions
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation
- Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups
- One-One Constrained Pseudorandom Functions.
- Adaptive multiparty NIKE
- Adaptively secure puncturable pseudorandom functions in the standard model
- Constrained pseudorandom functions for unconstrained inputs revisited: achieving verifiability and key delegation
- Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness
- Verifiable random functions with optimal tightness
- Non-naturally reductive Einstein metrics on \(\mathrm {SO}(n)\)
- Efficient and fully secure lattice-based IBE with equality test
- Constrained pseudorandom functions from homomorphic secret sharing
- Constrained pseudorandom functions from functional encryption
- Adaptive Security of Constrained PRFs
This page was built for publication: Adaptively secure constrained pseudorandom functions in the standard model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2096499)