Watermarking PRFs against quantum adversaries
From MaRDI portal
Publication:2170100
DOI10.1007/978-3-031-07082-2_18zbMath1502.81028arXiv2205.11034OpenAlexW4281493252MaRDI QIDQ2170100
Ryo Nishimaki, Fuyuki Kitagawa
Publication date: 30 August 2022
Full work available at URL: https://arxiv.org/abs/2205.11034
Quantum computation (81P68) Cryptography (94A60) Quantum measurement theory, state operations, state preparations (81P15) Quantum state spaces, operational and probabilistic concepts (81P16) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items
Public key encryption with secure key leasing ⋮ Tracing quantum state distinguishers via backtracking
Cites Work
- Unnamed Item
- Unnamed Item
- Watermarking PRFs under standard assumptions: public marking and security with extraction queries
- Equipping public-key cryptographic primitives with watermarking (or: a hole is to watermark)
- Secure software leasing
- Collusion resistant watermarkable PRFs from standard assumptions
- Schrödinger's pirate: how to trace a quantum decoder
- New approaches for quantum copy-protection
- Collusion resistant watermarking schemes for cryptographic functionalities
- Watermarking PRFs from lattices: stronger security via extractable PRFs
- Watermarking public-key cryptographic primitives
- How to record quantum queries, and applications to quantum indifferentiability
- Secure software leasing from standard assumptions
- Quantum Proofs of Knowledge
- Secure Identity-Based Encryption in the Quantum Random Oracle Model
- Zero-knowledge against quantum attacks
- Random Oracles in a Quantum World
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- From Weak to Strong Watermarking
- Watermarking Cryptographic Capabilities
- How to Watermark Cryptographic Functions
- On the (im)possibility of obfuscating programs
- Constraining Pseudorandom Functions Privately
- On lattices, learning with errors, random linear codes, and cryptography
- Watermarking cryptographic functionalities from standard lattice assumptions